Results 41 to 50 of about 2,994,964 (187)

Impact Assessment of GNSS Spoofing Attacks on INS/GNSS Integrated Navigation System

open access: yesSensors, 2018
In the face of emerging Global Navigation Satellite System (GNSS) spoofing attacks, there is a need to give a comprehensive analysis on how the inertial navigation system (INS)/GNSS integrated navigation system responds to different kinds of spoofing ...
Yang Liu   +3 more
doaj   +1 more source

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

Audio-replay attack detection countermeasures

open access: yes, 2017
This paper presents the Speech Technology Center (STC) replay attack detection systems proposed for Automatic Speaker Verification Spoofing and Countermeasures Challenge 2017.
Kozlov, Alexander   +5 more
core   +1 more source

Multi-Domain Feature Alignment for Face Anti-Spoofing

open access: yesSensors, 2023
Face anti-spoofing is critical for enhancing the robustness of face recognition systems against presentation attacks. Existing methods predominantly rely on binary classification tasks.
Shizhe Zhang, Wenhui Nie
doaj   +1 more source

Integrated LEO Constellation and In‐Cabin Distribution System for Continuous Aircraft 5G Connectivity

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT The integration of low Earth orbit (LEO) satellite constellations with commercial aircraft communication systems presents critical challenges in maintaining continuous connectivity during dynamic flight conditions. Current geostationary satellite systems suffer from high round‐trip latency (>$$ > $$ 500 ms) and inadequate coverage at high ...
Raúl Parada   +4 more
wiley   +1 more source

Influence of Standalone and Ensemble Classifiers in Face Spoofing Detection using LBP and CNN Models

open access: yesEuropean Journal of Electrical Engineering and Computer Science
Background: Artificial intelligence has made significant contributions to facial recognition and biometric identification and is now being employed in a range of applications.
M. Prasad   +3 more
semanticscholar   +1 more source

Tribo‐Electromagnetic Nanogenerator Based on Microstructured Polyvinyl Chloride Layer for Enhanced Hybrid Energy Harvesting and Intelligent Health Monitoring

open access: yesSmall, EarlyView.
A microstructured PVC‐based tribo‐electromagnetic nanogenerator (TEMNG) enables simultaneous harvesting of biomechanical and ambient electromagnetic energy. The hybrid device achieves high electrical outputs while supporting wearable sensing, gait monitoring, and self‐powered touch interfaces.
Ching‐Te Kuo   +4 more
wiley   +1 more source

Integrating Fine-Grained Classification and Motion Relation Analysis for Face Anti-Spoofing

open access: yesIEEE Access
Face Anti-Spoofing (FAS) is the core technical means used to protect face recognition systems from face presentation attack. Facial movement is a commonly used cue in FAS.
Ziyang Cheng, Xiafen Zhang
doaj   +1 more source

A Real-Time Face Detection Method Based on Blink Detection

open access: yesIEEE Access, 2023
Face anti-spoofing refers to the computer determining whether the face detected is a real face or a forged face. In user authentication scenarios, photo fraud attacks are easy to occur, where an illegal user logs into the system using a legitimate user ...
Hui Qi   +5 more
doaj   +1 more source

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy