نتایج جستجو برای: Spoofing order

تعداد نتایج: 910816  

The Global Positioning System (GPS) signals are very weak signal over wireless channels, so they are vulnerable to in-band interferences. Therefore, even a low-power interference can easily spoof GPS receivers. Among the variety of GPS signal interference, spoofing is considered as the most dangerous intentional interference. The spoofing effects can mitigate with an appropriate strategy in the...

2017
Xintong Wang Michael P. Wellman

We present an agent-based model of manipulating prices in financial markets through spoofing : submitting spurious orders to mislead traders who observe the order book. Built around the standard limit-order mechanism, our model captures a complex market environment with combined private and common values, the latter represented by noisy observations upon a dynamic fundamental time series. We co...

2017
Bo Zhao Qinying Chen

The worldwide Pokémon Go fever has brought location spoofing into the public’s spotlight. Location spoofing is an intentional act to masquerade locational information to somewhere other than the actual location where a network communication takes place. In the realm of Cartography and GIScience, compared with well-studied spatial quality issues, our knowledge of location spoofing is still quite...

2016
Massimiliano Todisco Héctor Delgado Nicholas Evans

Efforts to develop new countermeasures in order to protect automatic speaker verification from spoofing have intensified over recent years. The ASVspoof 2015 initiative showed that there is great potential to detect spoofing attacks, but also that the detection of previously unforeseen spoofing attacks remains challenging. This paper argues that there is more to be gained from the study of feat...

2016
Ivana CHINGOVSKA

The need for automation of the identity recognition process for a vast number of applications resulted in great advancement of biometric systems in the recent years. Yet, many studies indicate that these systems suffer from vulnerabilities to spoofing (presentation) attacks: a weakness that may compromise their usage in many cases. Face verification systems account for one of the most attractiv...

2014
Zhizheng Wu Tomi Kinnunen Nicholas Evans Junichi Yamagishi

The ASVspoof initiative follows on from the first special session in spoofing and countermeasures for automatic speaker verification (ASV) held during the 2013 edition of INTERSPEECH in Lyon, France [1]. The vision behind that first edition was to promote the consideration of spoofing, to encourage the development of anti-spoofing countermeasures and to gather a community to design, collect and...

A. R. Baziar M. R. Mosavi, M. Moazedi

Spoofing could pose a major threat to Global Positioning System (GPS) navigation, so the GPS users have to gain an in-depth understanding of GPS spoofing. Since spoofing attack can influence position results, spoof compensation is possible through reducing position deviations. In this paper, a novel processing technique is proposed and the wavelet transform is used to eliminate the impact of sp...

Journal: :Int. Arab J. Inf. Technol. 2016
Alwar Rengarajan Rajendran Sugumar Chinnappan Jayakumar

The Internet Protocol (IP) is the source of Internet transmission but an inadequate authentication technique paves a way for IP spoofing. Since, IP spoofing initiates more attacks in the network, a secure authentication technique is required to defend against spoofing attacks. In order to achieve this, in this paper, we p ropose a (SVT) for defending IP spoofing attacks. Our technique authentic...

2012
Saeed Daneshmand Ali Jafarnia-Jahromi Ali Broumandan Gérard Lachapelle Ali Jafarnia Jahromi

Spoofing attacks can completely mislead the position solution provided by global navigation satellite systems (GNSS). Recently, several anti-spoofing techniques have been introduced to combat spoofing attacks. However, in most cases the available anti-spoofing techniques are computationally complex or limited to a specific spoofing scenario. This paper provides a low computational complexity ap...

Journal: :Games 2021

We present an agent-based model of manipulating prices in financial markets through spoofing: submitting spurious orders to mislead traders who learn from the order book. Our captures a complex market environment for single security, whose common value is given by dynamic fundamental time series. Agents trade limit-order book, based on their private values and noisy observations fundamental. co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید