نتایج جستجو برای: spoofing order

تعداد نتایج: 910816  

2017
Galina Lavrentyeva Sergey Novoselov Egor Malykh Alexander Kozlov Oleg Kudashev Vadim Shchemelinin

This paper presents the Speech Technology Center (STC) replay attack detection systems proposed for Automatic Speaker Verification Spoofing and Countermeasures Challenge 2017. In this study we focused on comparison of different spoofing detection approaches. These were GMM based methods, high level features extraction with simple classifier and deep learning frameworks. Experiments performed on...

2005
Rolf Oppliger Sebastian Gajek

Phishing and Web spoofing have proliferated and become a major nuisance on the Internet. The attacks are difficult to protect against, mainly because they target non-cryptographic components, such as the user or the user-browser interface. This means that cryptographic security protocols, such as the SSL/TLS protocol, do not provide a complete solution to tackle the attacks and must be compleme...

Journal: :IEEE Transactions on Dependable and Secure Computing 2011

Journal: :Digital threats 2021

In this work, we examine the impact of Treadmill Assisted Gait Spoofing (TAGS) on Wearable Sensor-based Authentication (WSGait). We consider more realistic implementation and deployment scenarios than previous study, which focused only accelerometer sensor a fixed set features. Specifically, situations in WSGait could be using one or sensors embedded into modern smartphones. Besides, it differe...

2017
Nidhi Srivastava

Biometrics is an application area in which different biological traits of a person is taken as input for person identification or authentication. This is highly needed for security reasons. Unimodal biometrics is easy to implement as it uses only one trait or modality of a person but it has many drawbacks like spoofing, non-universality, etc. Multimodal biometrics uses more than one modality of...

2013
Michal Kovácik Michal Kajan Martin Zádník

Since a lot of the networks do not apply source IP filtering to its outgoing traffic, an attacker may insert an arbitrary source IP address in an outgoing packet, i.e., IP address spoofing. This paper elaborates on a possibility to detect the spoofing in a large network peering with other networks. A proposed detection scheme is based on an analysis of NetFlow data collected at the entry points...

Journal: :IOSR Journal of Computer Engineering 2014

Journal: :IEEE Transactions on Information Forensics and Security 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید