Results 101 to 110 of about 22,160 (195)

Disguised face liveness detection: an ensemble approach using deep features

open access: yesCogent Engineering
Deep learning models have surpassed classic machine learning models in face anti-spoofing detection during the last decade. Most face-spoofing detection algorithms are biased toward a single presentation attack, failing to robustly detect multiple ...
Padmashree G., Karunakar A. K.
doaj   +1 more source

GenAI-Based Jamming and Spoofing Attacks on UAVs

open access: yesIEEE Access
Recently, aerial vehicles have been more connected than ever, where there are many types of the vehicles. Uncrewed Aerial Vehicles (UAVs) operate on various environments with different technologies that are subject to many attacks. Creating effective intrusion detection systems against such attacks has been a significant challenge since there is a lack
Burcu Sönmez Sarikaya, Serif Bahtiyar
openaire   +2 more sources

GPS Spoofing-Resilient Filtering Using Self-Contained Sensors and Chimera Signal Enhancement

open access: yesNavigation
To protect civilian Global Positioning System (GPS) users from spoofing, the Air Force Research Lab has developed the chips-message robust authentication (Chimera) signal enhancement for the GPS L1C signal.
Tara Mina   +3 more
doaj   +1 more source

Global Navigation Satellite System Spoofing Attack Detection Using Receiver Independent Exchange Format Data and Long Short-Term Memory Algorithm

open access: yesInformation
Global Navigation Satellite Systems (GNSS) are widely used for positioning, navigation, and timing (PNT) applications, making them a critical infrastructure component.
Alexandru-Gabriel Romaniuc   +2 more
doaj   +1 more source

Wireless Networks Security Flaws and Hacking Avenues of Attacks

open access: yesNTU Journal of Engineering and Technology
An access point offers wireless networking to several wireless client nodes in the shared medium when using IEEE 802.11 wireless local area networks in infrastructure mode. The related nodes could be at risk of security attacks.
Asmaa Akram Ghanim   +1 more
doaj   +1 more source

Dynamic Watermarking for Finite Markov Decision Processes

open access: yesIEEE Open Journal of Control Systems
Dynamic watermarking is an active intrusion detection technique that can potentially detect replay attacks, spoofing attacks, and deception attacks in the feedback channel for control systems.
Jiacheng Tang   +2 more
doaj   +1 more source

Ack Spoofing Attack in IEEE 802.11 Infrastructure WLANs: Strategies, Detection and Mitigation

open access: yesIET Networks
This paper investigates a vulnerability in IEEE 802.11 wireless local area networks, focusing on a MAC sublayer attack known as acknowledgement (Ack) spoofing.
Ayat Al‐Wraikat   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy