نتایج جستجو برای: gps spoofing
تعداد نتایج: 34969 فیلتر نتایج به سال:
While biometrics technology has created new solutions to person authentication and has evolved to play a critical role in personal, national and global security, the potential for the technology to be fooled or spoofed is now widely acknowledged. For example, fingerprint verification systems can be spoofed with a synthetic material, such as gelatine, inscribed with the fingerprint ridges of an ...
Introduction Biometric devices have been suggested for use in applications from access to personal computers, automated teller machines, credit card transactions, electronic transactions to access control for airports, nuclear facilities, and border control. Given this diverse array of potential applications, biometric devices have the potential to provide additional security over traditional s...
IP spoofing is almost always used in one of the most difficult attack to defend against – Denial of Service (DoS) attack. DOS attack is evolving due to proliferation of diverse network application. Researchers have performed studies on online/offline network devices such as routers and IDS/IPS. While, the task of deep packet inspection is powerfully handled by IDS/IPS, the real time processing ...
GPS spoofing attacks are a severe threat to unmanned aerial vehicles. These manipulate the true state of vehicles, potentially misleading system without raising alarms. Several techniques, including machine learning, have been proposed detect these attacks. Most studies applied learning models identifying best hyperparameters, using feature selection and importance ensuring that used dataset is...
Safety cases provide high-level support for the development of critical systems. They present a graphical overview of arguments and evidence to demonstrate that complex applications are acceptably safe within a particular context of use. This paper shows how safety cases support the application of the latest generation of augmented Global Navigation Satellite Systems (GNSS). Unfortunately, at a...
Denial of Service (DoS) attacks present a serious problem for Internet communications. IP source address spoofing is used by DoS and DDoS attacks on targeted victim. IP spoofing to forge the source IP address of the packet, and thereby hide the identity of source. This makes hard to detect and defend against such attack. This paper presents a token based authentication and Packet Marking mechan...
Spoofing with falsified IP-MAC pair is the first step in most of the LAN based-attacks. Address Resolution Protocol (ARP) is stateless, which is the main cause that makes spoofing possible. Several network level and host level mechanisms have been proposed to detect and mitigate ARP spoofing but each of them has their own drawback. In this paper we propose a Host-based Intrusion Detection syste...
Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. Using spatial information the following are performed 1) detecting spoofing attacks; 2) determining the number...
User authentication is an important step to protect information, and in this context, face biometrics is potentially advantageous. Face biometrics is natural, intuitive, easy to use, and less human-invasive. Unfortunately, recent work has revealed that face biometrics is vulnerable to spoofing attacks using cheap low-tech equipment. This paper introduces a novel and appealing approach to detect...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید