نتایج جستجو برای: gps spoofing

تعداد نتایج: 34969  

2014
Ramesh kumar

Spoofing attack which easily attack the network and reduce the performance of the network. In this Paper, Spoofing attacks are detected, Finding the number of attackers that masquerade the node identity, Localizing all the attackers node and calculate the speed of a node, by using RSS (received signal strength) for spoofing detection. The number of attacker is determined by clusterbased method....

Journal: :CoRR 2015
Alan Godoy Flávio O. Simões José Augusto Stuchi Marcus A. Angeloni Mário Uliani Ricardo P. V. Violato

It is well known that speaker verification systems are subject to spoofing attacks. The Automatic Speaker Verification Spoofing and Countermeasures Challenge – ASVSpoof2015 – provides a standard spoofing database, containing attacks based on synthetic speech, along with a protocol for experiments. This paper describes CPqD’s systems submitted to the ASVSpoof2015 Challenge, based on deep neural ...

2016
Kaavya Sriskandaraja Vidhyasaharan Sethu Phu Ngoc Le Eliathamby Ambikairajah

A speaker verification system should include effective precautions against malicious spoofing attacks, and although some initial countermeasures have been recently proposed, this remains a challenging research problem. This paper investigates discrimination between spoofed and genuine speech, as a function of frequency bands, across the speech bandwidth. Findings from our investigation inform s...

2013
Nicholas W. D. Evans Tomi Kinnunen Junichi Yamagishi

It is widely acknowledged that most biometric systems are vulnerable to spoofing, also known as imposture. While vulnerabilities and countermeasures for other biometric modalities have been widely studied, e.g. face verification, speaker verification systems remain vulnerable. This paper describes some specific vulnerabilities studied in the literature and presents a brief survey of recent work...

2009
Georg T. Becker

The Positioning, Navigation and Timing (PNT) infrastructure becomes more and more important. Today, most PNT systems are based on the Global Positioning System (GPS). This dependency on GPS makes the PNT infrastructure very vulnerable. Therefore, a backup for GPS is needed in case of attacks on GPS or system failures. One of the most promising backups for GPS is the Long Range Navigation System...

2013
Abdenour Hadid Mohammad Ghahramani John D. Bustard Mark S. Nixon

Gait is a relatively new biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. While it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We r...

2003
Adrian Perrig Dawn Song Abraham Yaar

Today's Internet hosts are threatened by IP spoofing attacks and large scale Distributed Denial-of-Service (DDoS) attacks. We propose a new defense mechanism, StackPi, which unlike previous approaches, allows the host being attacked, or its upstream ISP, to filter out attack packets and to detect spoofed source IP addresses, on a per-packet basis. In StackPi, a packet is marked deterministicall...

2006
Shuo Chen Jose Meseguer Ralf Sasse Helen Wang Yi-Min Wang José Meseguer Helen J. Wang

To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws are a category of software vulnerabilities that result from logic bugs in GUI design/implementation. Visual spoofing attacks that exploit these flaws can lure even security-conscious users to perform unintended actions...

2016
Huiqi Tao Hong Li Mingquan Lu

The spoofing attack is one of the security threats of systems depending on the Global Navigation Satellite System (GNSS). There have been many GNSS spoofing detection methods, and each of them focuses on a characteristic of the GNSS signal or a measurement that the receiver has obtained. The method based on a single detector is insufficient against spoofing attacks in some scenarios. How to fus...

Journal: :Computer Speech & Language 2017
Massimiliano Todisco Héctor Delgado Nicholas W. D. Evans

Recent evaluations such as ASVspoof 2015 and the similarly-named AVspoof have stimulated a great deal of progress to develop spoofing countermeasures for automatic speaker verification. This paper reports an approach which combines speech signal analysis using the constant Q transform with traditional cepstral processing. The resulting constant Q cepstral coefficients (CQCCs) were introduced re...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید