نتایج جستجو برای: gps spoofing

تعداد نتایج: 34969  

2013
D. McPherson

The Source Address Validation Improvement (SAVI) effort aims to complement ingress filtering with finer-grained, standardized IP source address validation. This document describes threats enabled by IP source address spoofing both in the global and finer-grained context, describes currently available solutions and challenges, and provides a starting point analysis for finer-grained (host granul...

2013
D. McPherson

The Source Address Validation Improvement (SAVI) effort aims to complement ingress filtering with finer-grained, standardized IP source address validation. This document describes threats enabled by IP source address spoofing both in the global and finer-grained context, describes currently available solutions and challenges, and provides a starting point analysis for finer-grained (host granul...

2017
Olegs Nikisins Amir Mohammadi André Anjos

While face recognition systems got a significant boost in terms of recognition performance in recent years, they are known to be vulnerable to presentation attacks. Up to date, most of the research in the field of face anti-spoofing or presentation attack detection was considered as a two-class classification task: features of bona-fide samples versus features coming from spoofing attempts. The...

Journal: :IEEE open journal of the Communications Society 2023

Due to the low received power of Global Navigation Satellite Signals (GNSS), performance GNSS receivers can be disrupted by anthropogenic radio frequency interferences, with intentional jamming and spoofing activities being among most critical threats. It is reported in literature that modern, GNSS-equipped Android smartphones are generally resistant simplistic spoofing, many recent contributio...

Journal: :Computer Standards & Interfaces 2021

In the last decade, automotive industry incorporated multiple electronic components into vehicles introducing various capabilities for adversaries to generate diverse types of attacks. comparison older vehicles, where biggest concern was physical security, modern might be targeted remotely. As a result, attack vectors aiming disrupt different vehicle emerged. Research and practice lack comprehe...

Journal: :IJITEE (International Journal of Information Technology and Electrical Engineering) 2021

The biometric system is a security technology that uses information based on living person's characteristics to verify or recognize the identity, such as facial recognition. Face recognition has numerous applications in real world, access control and surveillance. But face issue of spoofing. A anti-spoofing, task prevent fake authorization by breaching systems using photo, video, mask, differen...

2016
Praveen Kumar

With internet expanding in every aspect of businesses infrastructure, it becomes more and more important to make these businesses infrastructures safe and secure to the numerous attacks perpetrated on them conspicuously when it comes to denial of service (DoS) attack. IP is an internet protocol each and every system having a unique address to use this address to communicate to the internet. The...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید