نتایج جستجو برای: spoofing order

تعداد نتایج: 910816  

2018
Meng Zhou Hong Li Mingquan Lu

A receiver-spoofer is one of the most covert global navigation satellite system (GNSS) spoofing attacks and can only be effectively detected by the combination of multiple anti-spoofing technologies. In this paper, an analysis of influencing parameters for receiver-spoofers indicates that the ratio of the spoofing signal amplitude versus the authentic signal amplitude (spoofing-signal ratio) is...

2016
Zhenjun Zhang Xingqun Zhan

Spoofing is becoming a serious threat to various Global Navigation Satellite System (GNSS) applications, especially for those that require high reliability and security such as power grid synchronization and applications related to first responders and aviation safety. Most current works on anti-spoofing focus on spoofing detection from the individual receiver side, which identifies spoofing wh...

2012
Kyle Wesson Daniel Shepard

GPS spoofing has become a hot topic. At the 2011 Institute of Navigation (ION) GNSS conference, 18 papers discussed spoofing, compared with the same number over the past decade. ION-GNSS also featured its first panel session on anti-spoofing, called “Improving Security of GNSS Receivers,” which offered six security experts a forum to debate the most promising anti-spoofing technologies. The spo...

2001
Joseph Ishac Mark Allman

In this paper, we analyze the performance of TCP in a network that consists of both satellite and terrestrial components. One method, proposed by outside research, to improve the performance of data transfers over satellites is to use a performance enhancing proxy often dubbed “spoofing”. Spoofing involves the transparent splitting of a TCP connection between the source and destination by some ...

Journal: :J. Visual Communication and Image Representation 2016
Litong Feng Lai-Man Po Yuming Li Xuyuan Xu Fang Yuan Chun-Ho Cheung William Kwok-Wai Cheung

Many trait-specific countermeasures to face spoofing attacks have been developed for security of face authentication. However, there is no superior face anti-spoofing technique to deal with every kind of spoofing attack in varying scenarios. In order to improve the generalization ability of face anti-spoofing approaches, an extendable multi-cues integration framework for face anti-spoofing usin...

2000
Joseph Ishac

In this paper, we analyze the performance of protocols in a network that consists of both satellite and terrestrial components. One method, proposed by outside research, to improve the performance of network transfers over satellite is to use a performance enhancing proxy often dubbed spoofing. Spoofing involves the transparent splitting of a network connection between the source and destinatio...

2017
Sukhchain Kaur Reecha Sharma

While multimodal biometric systems are considered to be more robust than unimodal ones but traditional fusion rules are more sensitive to spoofing attempts. The proposed system is designed to overcome spoofing in worst-case scenario where impostor was able to create fake biometric traits of both face and fingerprint modalities in the presented multimodal biometric system. The paper investigates...

2015
Nicholas W. D. Evans Federico Alegre Tomi Kinnunen Zhizheng Wu Junichi Yamagishi

As with any task involving statistical pattern recognition, the assessment of spoofing and anti-spoofing approaches for voice recognition calls for significantscale databases of spoofed speech signals. Depending on the application, these signals should normally reflect spoofing attacks performed prior to acquisition at the sensor or microphone. Since the collection of large quantities of any bi...

Journal: :Computer Speech & Language 2021

Abstract The evolution of modern voice-controlled devices (VCDs) has revolutionized the Internet Things (IoT) and resulted in increased realization smart homes, personalization, home automation through voice commands. These VCDs can be exploited IoT driven environments to generate various spoofing attacks, including chaining replay attacks (i.e. multi-order attacks). Existing datasets like ASVs...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید