نتایج جستجو برای: gps spoofing

تعداد نتایج: 34969  

2015
Yuting Ng Grace Xingxin Gao

Phasor Measurement Units (PMUs) provide timesynchronized, accurate and precise measurements of instantaneous voltages and currents at many locations across the electrical power system. The current state-of-the-art time transfer architecture for PMUs uses GPS time synchronization. The dependence on GPS for time synchronization introduces new vulnerabilities to a power system utilizing PMUs. Thus...

2016
Ivana CHINGOVSKA

The need for automation of the identity recognition process for a vast number of applications resulted in great advancement of biometric systems in the recent years. Yet, many studies indicate that these systems suffer from vulnerabilities to spoofing (presentation) attacks: a weakness that may compromise their usage in many cases. Face verification systems account for one of the most attractiv...

Journal: :Telecommunication Systems 2006
Wei Chen Dit-Yan Yeung

3 Abstract TCP-based flooding attacks are a common form of Distributed Denial-of-Service 4 (DDoS) attacks which abuse network resources and can bring about serious threats to the Internet. 5 Incorporating IP spoofing makes it even more difficult to defend against such attacks. Among 6 different IP spoofing techniques, which include random spoofing, subnet spoofing and fixed 7 spoofing, subnet s...

Journal: :IEEE Access 2022

This paper presents a robust system for mitigating adversarial and natural GPS disruptions by presenting: (1) software-based defense mechanism against spoofing attacks using generative networks (GANs), The detects unauthorized or spoofed signals from hardware based spoofer, (2) deep neural network models to infer positioning information in GPS-degraded /denied environments the novel idea of sat...

2016
Galina Lavrentyeva Sergey Novoselov Konstantin Simonchik

Growing interest in automatic speaker verification (ASV) systems has lead to significant quality improvement of spoofing attacks on them. Many research works confirm that despite the low equal error rate (EER) ASV systems are still vulnerable to spoofing attacks. In this work we overview different acoustic feature spaces and classifiers to determine reliable and robust countermeasures against s...

2017
P. Devakumar

Biometric systems are vulnerable to certain type of attacks at various points in the biometric model. A spoofing attack which is submitting a stolen, copied biometric trait to the sensor to gain unauthorized access to the biometric system is one among them. Multimodal biometric systems are designed to increase the accuracy of the biometric system, but they are more vulnerable to spoofing attack...

2017
Galina Lavrentyeva Sergey Novoselov Egor Malykh Alexander Kozlov Oleg Kudashev Vadim Shchemelinin

Nowadays spoofing detection is one of the priority research areas in the field of automatic speaker verification. The success of Automatic Speaker Verification Spoofing and Countermeasures (ASVspoof) Challenge 2015 confirmed the impressive perspective in detection of unforeseen spoofing trials based on speech synthesis and voice conversion techniques. However, there is a small number of researc...

2016
Merlin Livingston Nesli Erdogmus

Biometrics systems have significantly improved person identification and authentication, playing an important role in personal, national, and global security. However, these systems might be deceived (or “spoofed”).The recent advances in spoofing detection, current solutions often rely on S domain knowledge, specific biometric reading systems, and attack types. We assume a very limited knowledg...

2017
Bo Zhao Qinying Chen

The worldwide Pokémon Go fever has brought location spoofing into the public’s spotlight. Location spoofing is an intentional act to masquerade locational information to somewhere other than the actual location where a network communication takes place. In the realm of Cartography and GIScience, compared with well-studied spatial quality issues, our knowledge of location spoofing is still quite...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید