نتایج جستجو برای: spoofing order
تعداد نتایج: 910816 فیلتر نتایج به سال:
A receiver-spoofer is one of the most covert global navigation satellite system (GNSS) spoofing attacks and can only be effectively detected by the combination of multiple anti-spoofing technologies. In this paper, an analysis of influencing parameters for receiver-spoofers indicates that the ratio of the spoofing signal amplitude versus the authentic signal amplitude (spoofing-signal ratio) is...
Spoofing is becoming a serious threat to various Global Navigation Satellite System (GNSS) applications, especially for those that require high reliability and security such as power grid synchronization and applications related to first responders and aviation safety. Most current works on anti-spoofing focus on spoofing detection from the individual receiver side, which identifies spoofing wh...
GPS spoofing has become a hot topic. At the 2011 Institute of Navigation (ION) GNSS conference, 18 papers discussed spoofing, compared with the same number over the past decade. ION-GNSS also featured its first panel session on anti-spoofing, called “Improving Security of GNSS Receivers,” which offered six security experts a forum to debate the most promising anti-spoofing technologies. The spo...
In this paper, we analyze the performance of TCP in a network that consists of both satellite and terrestrial components. One method, proposed by outside research, to improve the performance of data transfers over satellites is to use a performance enhancing proxy often dubbed “spoofing”. Spoofing involves the transparent splitting of a TCP connection between the source and destination by some ...
Many trait-specific countermeasures to face spoofing attacks have been developed for security of face authentication. However, there is no superior face anti-spoofing technique to deal with every kind of spoofing attack in varying scenarios. In order to improve the generalization ability of face anti-spoofing approaches, an extendable multi-cues integration framework for face anti-spoofing usin...
In this paper, we analyze the performance of protocols in a network that consists of both satellite and terrestrial components. One method, proposed by outside research, to improve the performance of network transfers over satellite is to use a performance enhancing proxy often dubbed spoofing. Spoofing involves the transparent splitting of a network connection between the source and destinatio...
While multimodal biometric systems are considered to be more robust than unimodal ones but traditional fusion rules are more sensitive to spoofing attempts. The proposed system is designed to overcome spoofing in worst-case scenario where impostor was able to create fake biometric traits of both face and fingerprint modalities in the presented multimodal biometric system. The paper investigates...
As with any task involving statistical pattern recognition, the assessment of spoofing and anti-spoofing approaches for voice recognition calls for significantscale databases of spoofed speech signals. Depending on the application, these signals should normally reflect spoofing attacks performed prior to acquisition at the sensor or microphone. Since the collection of large quantities of any bi...
Abstract The evolution of modern voice-controlled devices (VCDs) has revolutionized the Internet Things (IoT) and resulted in increased realization smart homes, personalization, home automation through voice commands. These VCDs can be exploited IoT driven environments to generate various spoofing attacks, including chaining replay attacks (i.e. multi-order attacks). Existing datasets like ASVs...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید