|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 302 occurrences of 168 keywords
|
|
|
Results
Found 2381 publication records. Showing 2381 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
143 | Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig |
BASE: an incrementally deployable mechanism for viable IP spoofing prevention. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
BGP anti-spoofing extension, packet marking and filtering, DDoS attack, IP spoofing |
124 | Wei Chen, Dit-Yan Yeung |
Throttling spoofed SYN flooding traffic at the source. |
Telecommun. Syst. |
2006 |
DBLP DOI BibTeX RDF |
Hash-based detection, CUSUM, Bloom filter, DDoS, IP spoofing, SYN flooding |
118 | Wei Chen, Dit-Yan Yeung |
Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing. |
ICN/ICONS/MCL |
2006 |
DBLP DOI BibTeX RDF |
|
114 | Toby Ehrenkranz, Jun Li 0001 |
On the state of IP spoofing defense. |
ACM Trans. Internet Techn. |
2009 |
DBLP DOI BibTeX RDF |
spoofing defense, spoofing packet, packet filtering, IP spoofing |
113 | Xicheng Lu, Gaofeng Lü, Peidong Zhu, Yijiao Chen |
MASK: An efficient mechanism to extend inter-domain IP spoofing preventions. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
IP spoofing prevention, BGP, DDoS |
113 | Fang Qi, Feng Bao 0001, Tieyan Li, Weijia Jia 0001, Yongdong Wu |
Preventing Web-Spoofing with Automatic Detecting Security Indicator. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
Automatic Detecting Security Indicator, SSL, Web Spoofing |
96 | Rolf Oppliger, Sebastian Gajek |
Effective Protection Against Phishing and Web Spoofing. |
Communications and Multimedia Security |
2005 |
DBLP DOI BibTeX RDF |
visual spoofing, phishing, SSL/TLS, Web spoofing |
84 | Yan Shen, Jun Bi, Jianping Wu, Qiang Liu |
The Automatic Peer-to-Peer Signature for Source Address Validation. |
KES (1) |
2007 |
DBLP DOI BibTeX RDF |
Source Address Spoofing, Spoofing Prevention, Key Management |
77 | Jihyun Lee, Hyungyu Park, Kyungshik Lim |
Rate-Adaptive TCP Spoofing with Segment Aggregation over Asymmetric Long Delay Links. |
ICOIN |
2007 |
DBLP DOI BibTeX RDF |
Rate-Adaptive TCP Spoofing, Segment Aggregation, Asymmetry Long Delay Link, TCP, PEP |
71 | Yingying Chen 0001, Wade Trappe, Richard P. Martin |
Detecting and Localizing Wireless Spoofing Attacks. |
SECON |
2007 |
DBLP DOI BibTeX RDF |
|
66 | Zhenhai Duan, Xin Yuan 0001, Jaideep Chandrashekar |
Controlling IP Spoofing through Interdomain Packet Filters. |
IEEE Trans. Dependable Secur. Comput. |
2008 |
DBLP DOI BibTeX RDF |
Infrastructure Protection, Routing Protocols, BGP, DDoS, Network-level security and protection, IP Spoofing |
66 | Asier Martínez, Urko Zurutuza, Roberto Uribeetxeberria, Miguel Fernández, Jesus Lizarraga, Ainhoa Serna, Iñaki Vélez |
Beacon Frame Spoofing Attack Detection in IEEE 802.11 Networks. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
802.11 MAC address spoofing, false positive |
66 | Voravud Santiraveewan, Yongyuth Permpoontanalarp |
A Graph-based Methodology for Analyzing IP Spoofing Attack. |
AINA (2) |
2004 |
DBLP DOI BibTeX RDF |
IP spoofing and Formal Method for Network Security, Network Security, Firewalls |
65 | Roman V. Yampolskiy |
Mimicry Attack on Strategy-Based Behavioral Biometric. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
Biometric, Behavior, Poker, Spoofing, Mimicry |
64 | Dong Yi, Zhen Lei 0001, Zhiwei Zhang, Stan Z. Li |
Face Anti-spoofing: Multi-spectral Approach. |
Handbook of Biometric Anti-Spoofing |
2014 |
DBLP DOI BibTeX RDF |
|
64 | John D. Bustard, Mohammad Ghahramani, John N. Carter, Abdenour Hadid, Mark S. Nixon |
Gait Anti-spoofing. |
Handbook of Biometric Anti-Spoofing |
2014 |
DBLP DOI BibTeX RDF |
|
64 | André Anjos, Jukka Komulainen, Sébastien Marcel, Abdenour Hadid, Matti Pietikäinen |
Face Anti-spoofing: Visual Approach. |
Handbook of Biometric Anti-Spoofing |
2014 |
DBLP DOI BibTeX RDF |
|
64 | Andrew P. Rebera |
Ethical Issues in Anti-spoofing. |
Handbook of Biometric Anti-Spoofing |
2014 |
DBLP DOI BibTeX RDF |
|
64 | Giorgio Fumera, Gian Luca Marcialis, Battista Biggio, Fabio Roli, Stephanie A. C. Schuckers |
Multimodal Anti-spoofing in Biometric Recognition Systems. |
Handbook of Biometric Anti-Spoofing |
2014 |
DBLP DOI BibTeX RDF |
|
64 | Nicholas W. D. Evans, Tomi Kinnunen, Junichi Yamagishi, Zhizheng Wu 0001, Federico Alegre, Phillip L. De Leon |
Speaker Recognition Anti-spoofing. |
Handbook of Biometric Anti-Spoofing |
2014 |
DBLP DOI BibTeX RDF |
|
64 | Javier Galbally, Julian Fiérrez-Aguilar, Javier Ortega-Garcia, Raffaele Cappelli |
Fingerprint Anti-spoofing in Biometric Systems. |
Handbook of Biometric Anti-Spoofing |
2014 |
DBLP DOI BibTeX RDF |
|
64 | Zhenan Sun, Tieniu Tan |
Iris Anti-spoofing. |
Handbook of Biometric Anti-Spoofing |
2014 |
DBLP DOI BibTeX RDF |
|
59 | Yan Shen, Jun Bi, Jianping Wu, Qiang Liu |
A two-level source address spoofing prevention based on automatic signature and verification mechanism. |
ISCC |
2008 |
DBLP DOI BibTeX RDF |
|
59 | Vivek Ramachandran, Sukumar Nandi |
Detecting ARP Spoofing: An Active Technique. |
ICISS |
2005 |
DBLP DOI BibTeX RDF |
|
59 | José Meseguer 0001, Ralf Sasse, Helen J. Wang, Yi-Min Wang |
A Systematic Approach to Uncover Security Flaws in GUI Logic. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
59 | Fanglu Guo, Tzi-cker Chiueh |
Sequence Number-Based MAC Address Spoof Detection. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
Wireless LAN MAC spoof detection, WLAN monitoring and intrusion detection, Sequence number |
54 | Christian Schridde, Matthew Smith 0001, Bernd Freisleben |
TrueIP: prevention of IP spoofing attacks using identity-based cryptography. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
network security, denial-of-service, signatures, identity-based cryptography, IP spoofing |
54 | Jun Bi, Jianping Wu, Miao Zhang |
Enable a Trustworthy Network by Source Address Spoofing Prevention Routers: A Formal Description. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
Source Address Spoofing, Source Address Validation, Network Security |
54 | Robert Beverly, Arthur W. Berger, Young Hyun, kc claffy |
Understanding the efficacy of deployed internet source address validation filtering. |
Internet Measurement Conference |
2009 |
DBLP DOI BibTeX RDF |
ip spoofing, source address validation, filtering |
52 | Christoph Busch 0001 |
Related Standards. |
Handbook of Biometric Anti-Spoofing |
2014 |
DBLP DOI BibTeX RDF |
|
52 | Ivana Chingovska, André Anjos, Sébastien Marcel |
Evaluation Methodologies. |
Handbook of Biometric Anti-Spoofing |
2014 |
DBLP DOI BibTeX RDF |
|
52 | Nesli Erdogmus, Sébastien Marcel |
Introduction. |
Handbook of Biometric Anti-Spoofing |
2014 |
DBLP DOI BibTeX RDF |
|
52 | |
Impact of artificial gummy fingers on fingerprint systems. |
Handbook of Biometric Anti-Spoofing |
2014 |
DBLP BibTeX RDF |
|
52 | Christophe Champod, Marcela Espinoza |
Forgeries of Fingerprints in Forensic Science. |
Handbook of Biometric Anti-Spoofing |
2014 |
DBLP DOI BibTeX RDF |
|
52 | Els J. Kindt |
Legal Aspects: Biometric Data, Evidence Rules and Trusted Identities. |
Handbook of Biometric Anti-Spoofing |
2014 |
DBLP DOI BibTeX RDF |
|
49 | Mingjiang Ye, Jianping Wu, Miao Zhang |
Experience with SPM in IPv6. |
International Conference on Computational Science (4) |
2007 |
DBLP DOI BibTeX RDF |
Source Address Spoofing, Spoofing Prevention, Security |
47 | Jeffrey Horton, Jennifer Seberry |
Covert Distributed Computing Using Java Through Web Spoofing. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
47 | Fang Qi, Zhe Tang, Guojun Wang 0001 |
Attacks vs. Countermeasures of SSL Protected Trust Model. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Richa Bansal, Siddharth Tiwari, Divya Bansal |
Non-cryptographic methods of MAC spoof detection in wireless LAN. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Fan Min 0001, Jun-yan Zhang, Guo-wie Yang |
An IP Traceback Scheme Integrating DPM and PPM. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
Deterministic Packet Marking, Denial of Service, IP traceback, IP spoofing, Probabilistic Packet Marking |
40 | Javier Hernandez-Ortega, Julian Fiérrez, Aythami Morales, Javier Galbally |
Introduction to Face Presentation Attack Detection. |
Handbook of Biometric Anti-Spoofing, 2nd Ed. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Ivana Chingovska, Amir Mohammadi, André Anjos, Sébastien Marcel |
Evaluation Methodologies for Biometric Presentation Attack Detection. |
Handbook of Biometric Anti-Spoofing, 2nd Ed. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Ruben Tolosana, Rubén Vera-Rodríguez, Julian Fiérrez, Javier Ortega-Garcia |
Presentation Attacks in Signature Biometrics: Types and Introduction to Attack Detection. |
Handbook of Biometric Anti-Spoofing, 2nd Ed. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Christoph Busch 0001 |
Standards for Biometric Presentation Attack Detection. |
Handbook of Biometric Anti-Spoofing, 2nd Ed. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Adam Czajka, Benedict Becker |
Application of Dynamic Features of the Pupil for Iris Presentation Attack Detection. |
Handbook of Biometric Anti-Spoofing, 2nd Ed. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Guillaume Heusch, Sébastien Marcel |
Remote Blood Pulse Analysis for Face Presentation Attack Detection. |
Handbook of Biometric Anti-Spoofing, 2nd Ed. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Jukka Komulainen, Zinelabidine Boulkenafet, Zahid Akhtar |
Review of Face Presentation Attack Detection Competitions. |
Handbook of Biometric Anti-Spoofing, 2nd Ed. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Md. Sahidullah, Héctor Delgado, Massimiliano Todisco, Tomi Kinnunen, Nicholas W. D. Evans, Junichi Yamagishi, Kong-Aik Lee |
Introduction to Voice Presentation Attack Detection and Recent Advances. |
Handbook of Biometric Anti-Spoofing, 2nd Ed. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Pavel Korshunov, Sébastien Marcel |
A Cross-Database Study of Voice Presentation Attack Detection. |
Handbook of Biometric Anti-Spoofing, 2nd Ed. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Javier Galbally, Julian Fiérrez, Raffaele Cappelli |
An Introduction to Fingerprint Presentation Attack Detection. |
Handbook of Biometric Anti-Spoofing, 2nd Ed. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | David Yambay, Adam Czajka, Kevin W. Bowyer, Mayank Vatsa, Richa Singh 0001, Afzel Noore, Naman Kohli, Daksha Yadav, Stephanie Schuckers |
Review of Iris Presentation Attack Detection Competitions. |
Handbook of Biometric Anti-Spoofing, 2nd Ed. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | André Anjos, Pedro Tome, Sébastien Marcel |
An Introduction to Vein Presentation Attacks and Detection. |
Handbook of Biometric Anti-Spoofing, 2nd Ed. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Aythami Morales, Julian Fiérrez, Javier Galbally, Marta Gomez-Barrero |
Introduction to Iris Presentation Attack Detection. |
Handbook of Biometric Anti-Spoofing, 2nd Ed. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Kiran B. Raja, Ramachandra Raghavendra, Sushma Venkatesh, Marta Gomez-Barrero, Christian Rathgeb, Christoph Busch 0001 |
A Study of Hand-Crafted and Naturally Learned Features for Fingerprint Presentation Attack Detection. |
Handbook of Biometric Anti-Spoofing, 2nd Ed. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Els J. Kindt |
A Legal Perspective on the Relevance of Biometric Presentation Attack Detection (PAD) for Payment Services Under PSDII and the GDPR. |
Handbook of Biometric Anti-Spoofing, 2nd Ed. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Ivan Himawan, Srikanth R. Madikeri, Petr Motlícek, Milos Cernak, Sridha Sridharan, Clinton Fookes |
Voice Presentation Attack Detection Using Convolutional Neural Networks. |
Handbook of Biometric Anti-Spoofing, 2nd Ed. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | David Yambay, Luca Ghiani, Gian Luca Marcialis, Fabio Roli, Stephanie Schuckers |
Review of Fingerprint Presentation Attack Detection Competitions. |
Handbook of Biometric Anti-Spoofing, 2nd Ed. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Artur Costa-Pazo, Esteban Vázquez-Fernández, José Luis Alba-Castro, Daniel González-Jiménez |
Challenges of Face Presentation Attack Detection in Real Scenarios. |
Handbook of Biometric Anti-Spoofing, 2nd Ed. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Si-Qi Liu 0003, Pong C. Yuen, Xiaobai Li, Guoying Zhao 0001 |
Recent Progress on Face Presentation Attack Detection of 3D Mask Attacks. |
Handbook of Biometric Anti-Spoofing, 2nd Ed. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Sushil Bhattacharjee, Amir Mohammadi, André Anjos, Sébastien Marcel |
Recent Advances in Face Presentation Attack Detection. |
Handbook of Biometric Anti-Spoofing, 2nd Ed. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Pierluigi Tuveri, Luca Ghiani, Mikel Zurutuza, Valerio Mura, Gian Luca Marcialis |
Interoperability Among Capture Devices for Fingerprint Presentation Attacks Detection. |
Handbook of Biometric Anti-Spoofing, 2nd Ed. |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Yaseen Moolla, Luke Nicholas Darlow, Ameeth Sharma, Ann Singh, Johan Van Der Merwe |
Optical Coherence Tomography for Fingerprint Presentation Attack Detection. |
Handbook of Biometric Anti-Spoofing, 2nd Ed. |
2019 |
DBLP DOI BibTeX RDF |
|
37 | Gian Luca Marcialis, Aaron Lewicke, Bozhao Tan, Pietro Coli, Dominic Grimberg, Alberto Congiu, Alessandra Tidu, Fabio Roli, Stephanie A. C. Schuckers |
First International Fingerprint Liveness Detection Competition - LivDet 2009. |
ICIAP |
2009 |
DBLP DOI BibTeX RDF |
anti-spoofing protection, security, biometrics, Fingerprint, spoofing, liveness detection |
37 | Aniello Castiglione, Roberto De Prisco, Alfredo De Santis |
Do You Trust Your Phone? |
EC-Web |
2009 |
DBLP DOI BibTeX RDF |
SMS security, mobile malware, telephone phishing, telephone pharming, caller ID spoofing, SMS spoofing, NGN, identity theft, untraceability, VoIP security |
36 | Yong Sheng, Keren Tan, Guanling Chen, David Kotz, Andrew T. Campbell |
Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Qing Li 0034, Wade Trappe |
Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships. |
IEEE Trans. Inf. Forensics Secur. |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Viktor Krammer |
Phishing defense against IDN address spoofing attacks. |
PST |
2006 |
DBLP DOI BibTeX RDF |
usability, web browsers, phishing, internet security, unicode, internationalized domain names |
36 | Anat Bremler-Barr, Hanoch Levy |
Spoofing prevention method. |
INFOCOM |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Mihui Kim, Kijoon Chae |
A Fast Defense Mechanism Against IP Spoofing Traffic in a NEMO Environment. |
ICOIN |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Leonid M. Tombak, Reihaneh Safavi-Naini |
Authentication Codes That Are r-Fold Secure Against Spoofing. |
CCS |
1994 |
DBLP DOI BibTeX RDF |
r-fold security, authentication, cryptography, computer security, authentication codes |
35 | Kashif Ali, Mohammad Zulkernine, Hossam S. Hassanein |
Packet Filtering Based on Source Router Marking and Hop-Count. |
LCN |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Hyuncheol Kim, Seong-Jin Ahn 0001, Jun Kyun Choi |
Performance Analysis of Dynamic Host Isolation System in Wireless Mobile Networks. |
ICCSA (5) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Amir Herzberg, Ahmad Jbara |
Security and identification indicators for browsers against spoofing and phishing attacks. |
ACM Trans. Internet Techn. |
2008 |
DBLP DOI BibTeX RDF |
Human-computer interaction, phishing, secure usability, Web spoofing |
31 | Lizhong Xie, Jun Bi, Jianping Wu |
An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network. |
International Conference on Computational Science (4) |
2007 |
DBLP DOI BibTeX RDF |
Source Address Spoofing, Edge Network, IPv6 |
31 | Anat Bremler-Barr, Hanoch Levy |
Brief announcement: spoofing prevention method. |
PODC |
2004 |
DBLP DOI BibTeX RDF |
source IP spoofing, distributed denial of service |
30 | Ruishan Zhang, Xinyuan Wang 0005, Ryan Farley, Xiaohui Yang, Xuxian Jiang |
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
DNS spoofing, MITM attacks, SIP, VoIP security |
30 | Dingyi Pei |
New Family of Non-Cartesian Perfect Authentication Codes. |
IWCC |
2009 |
DBLP DOI BibTeX RDF |
perfect authentication codes, subfield rational normal curves, partially balanced designs, spoofing attacks |
30 | Tae Hwan Kim, Dong Seong Kim 0001, Sang Min Lee 0012, Jong Sou Park |
Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Traffic visualization, Weighted moving average, Intrusion detection, Distributed Denial of Service attacks, Traffic matrix, IP spoofing |
30 | Keisuke Takemori, Masahiko Fujinaga, Toshiya Sayama, Masakatsu Nishigaki |
Host-based traceback; tracking bot and C&C server. |
ICUIMC |
2009 |
DBLP DOI BibTeX RDF |
DNS reflection attack, host-based traceback, botnet, IP spoofing |
30 | Suman Jana, Sneha Kumar Kasera |
On fast and accurate detection of unauthorized wireless access points using clock skews. |
MobiCom |
2008 |
DBLP DOI BibTeX RDF |
MAC address spoofing, fake access point, IEEE 802.11, fingerprint, timestamp |
30 | Haining Wang, Cheng Jin, Kang G. Shin |
Defense against spoofed IP traffic using hop-count filtering. |
IEEE/ACM Trans. Netw. |
2007 |
DBLP DOI BibTeX RDF |
host-based, DDoS attacks, IP spoofing, hop-count |
30 | Marwan Abi-Antoun, Daniel Wang, Peter Torr |
Checking threat modeling data flow diagrams for implementation conformance and security. |
ASE |
2007 |
DBLP DOI BibTeX RDF |
reflexion models, denial of service, security analysis, threat modeling, data flow diagrams, information disclosure, tampering, spoofing |
30 | Birger Tödtmann, Erwin P. Rathgeb |
Anticipatory Distributed Packet Filter Configuration for Carrier-Grade IP-Networks. |
Networking |
2006 |
DBLP DOI BibTeX RDF |
Network Security, Packet Filters, IP Spoofing, Critical Infrastructure Protection |
30 | Changho Choi, Yingfei Dong, Zhi-Li Zhang |
LIPS: Lightweight Internet Permit System for Stopping Unwanted Packets. |
NETWORKING |
2005 |
DBLP DOI BibTeX RDF |
Unwanted Packets, Network Security, Denial of Service, IP Spoofing |
30 | Min-Hui Lin 0001, Chin-Chen Chang 0001 |
A secure one-time password authentication scheme with low-computation for mobile communications. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
off-line dictionary attack, server spoofing attack, authentication, smart card, replay attack, one-time password |
24 | Shen Wang 0008, Mahshid Delavar, Muhammad Ajmal Azad, Farshad Nabizadeh, Steve Smith, Feng Hao 0001 |
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems. |
ACM Trans. Priv. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
24 | Ji Hyuk Jung, Miyeon Hong, Hyeongjun Choi, Ji Won Yoon |
An Analysis of GPS Spoofing Attack and Efficient Approach to Spoofing Detection in PX4. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
24 | Bin Zhang, Xiangyu Zhu, Xiaoyu Zhang 0002, Zhen Lei 0001 |
Modeling Spoof Noise by De-spoofing Diffusion and its Application in Face Anti-spoofing. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
24 | Zheng Zheng, Qian Wang 0002, Cong Wang |
Spoofing Attacks and Anti-Spoofing Methods for Face Authentication Over Smartphones. |
IEEE Commun. Mag. |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Awais Khan 0007, Khalid Mahmood Malik, James Ryan, Mikul Saravanan |
Battling voice spoofing: a review, comparative analysis, and generalizability evaluation of state-of-the-art voice spoofing counter measures. |
Artif. Intell. Rev. |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Shen Wang 0008, Mahshid Delavar, Muhammad Ajmal Azad, Farshad Nabizadeh, Steve Smith, Feng Hao 0001 |
Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Bin Zhang, Xiangyu Zhu, Xiaoyu Zhang 0002, Zhen Lei 0001 |
Modeling Spoof Noise by De-spoofing Diffusion and its Application in Face Anti-spoofing. |
IJCB |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Hande Isil Akçay, Tolga Girici, Emrah Onat |
Spoofing Detection and Anti-Spoofing Kalman Filter Design for an Accelerometer-Integrated GNSS Receiver. |
SIU |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Yangjun Gao, Guangyun Li |
A Slowly Varying Spoofing Algorithm Avoiding Tightly-Coupled GNSS/IMU With Multiple Anti-Spoofing Techniques. |
IEEE Trans. Veh. Technol. |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Ali Javed, Khalid Mahmood Malik, Hafiz Malik, Aun Irtaza |
Voice spoofing detector: A unified anti-spoofing framework. |
Expert Syst. Appl. |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Lianxiao Meng, Lin Yang, Wu Yang 0001, Long Zhang 0004 |
A Survey of GNSS Spoofing and Anti-Spoofing Technology. |
Remote. Sens. |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Long Huang, Zukun Lu, Chao Ren, Zhe Liu, Zhibin Xiao, Jie Song, Baiyu Li |
Research on Detection Technology of Spoofing under the Mixed Narrowband and Spoofing Interference. |
Remote. Sens. |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Mihir Mehta, Kajal Patel |
Experimental Study of Location Spoofing and Identity Spoofing Attack in Internet of Things Network. |
Int. J. Intell. Inf. Technol. |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Shanaka Anuradha Samarakoon |
Bypassing Content-based internet packages with an SSL/TLS Tunnel, SNI Spoofing, and DNS spoofing. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Yangjun Gao, Guangyun Li |
A Slowly Varying Spoofing Algorithm on Loosely Coupled GNSS/IMU Avoiding Multiple Anti-Spoofing Techniques. |
Sensors |
2022 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 2381 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|