Results 1 to 10 of about 22,758 (191)

Secure Trajectory Planning Against Undetectable Spoofing Attacks [PDF]

open access: greenAutomatica, 2019
This paper studies, for the first time, the trajectory planning problem in adversarial environments, where the objective is to design the trajectory of a robot to reach a desired final state despite the unknown and arbitrary action of an attacker.
Bianchin, Gianluca   +2 more
core   +5 more sources

Spoofing Attack Results Determination in Code Domain Using a Spoofing Process Equation. [PDF]

open access: yesSensors (Basel), 2019
When a user receiver is tracking an authentic signal, a spoofing signal can be transmitted to the user antenna. The question is under what conditions does the tracking point of the receiver move from the authentic signal to the spoofing signal? In this study, we develop a spoofing process equation (SPE) that can be used to calculate the tracking point ...
Shin B   +5 more
europepmc   +4 more sources

Launching Email Spoofing Attacks

open access: bronzeInternational Journal of Computer Applications, 2010
To launch a spoofing attack with emails we need to have knowledge of the techniques to launch an email spoofing attack. Spoofing has been widely discussed in documents on the Internet. Email spoofing is termed as an attack on email users who are sent emails from email addresses that are fake or altered.
Kunal Pandove   +2 more
openaire   +2 more sources

Active eavesdropping via spoofing relay attack [PDF]

open access: yes2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2016
This paper studies a new active eavesdropping technique via the so-called spoofing relay attack, which could be launched by the eavesdropper to significantly enhance the information leakage rate from the source over conventional passive eaves-dropping.
Zeng, Yong, Zhang, Rui
openaire   +2 more sources

Spoofing Attack Detection by Anomaly Detection [PDF]

open access: yesICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2019
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this paper we focus on face spoofing detection. The majority of papers on spoofing attack detection formulate the problem as a two or multiclass learning task, attempting to separate normal accesses from samples of different types of spoofing attacks.
Fatemifar, Soroush   +3 more
openaire   +3 more sources

Improving Gait Biometrics under Spoofing Attacks [PDF]

open access: yes, 2013
Gait is a relatively new biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. While it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the ...
Hadid, Abdenour   +3 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy