Results 101 to 110 of about 22,160 (195)
Robust Indoor Localization Methods Using Random Forest-Based Filter against MAC Spoofing Attack. [PDF]
Ko D, Choi SH, Ahn S, Choi YH.
europepmc +1 more source
Disguised face liveness detection: an ensemble approach using deep features
Deep learning models have surpassed classic machine learning models in face anti-spoofing detection during the last decade. Most face-spoofing detection algorithms are biased toward a single presentation attack, failing to robustly detect multiple ...
Padmashree G., Karunakar A. K.
doaj +1 more source
GenAI-Based Jamming and Spoofing Attacks on UAVs
Recently, aerial vehicles have been more connected than ever, where there are many types of the vehicles. Uncrewed Aerial Vehicles (UAVs) operate on various environments with different technologies that are subject to many attacks. Creating effective intrusion detection systems against such attacks has been a significant challenge since there is a lack
Burcu Sönmez Sarikaya, Serif Bahtiyar
openaire +2 more sources
GPS Spoofing-Resilient Filtering Using Self-Contained Sensors and Chimera Signal Enhancement
To protect civilian Global Positioning System (GPS) users from spoofing, the Air Force Research Lab has developed the chips-message robust authentication (Chimera) signal enhancement for the GPS L1C signal.
Tara Mina +3 more
doaj +1 more source
Global Navigation Satellite Systems (GNSS) are widely used for positioning, navigation, and timing (PNT) applications, making them a critical infrastructure component.
Alexandru-Gabriel Romaniuc +2 more
doaj +1 more source
Wireless Networks Security Flaws and Hacking Avenues of Attacks
An access point offers wireless networking to several wireless client nodes in the shared medium when using IEEE 802.11 wireless local area networks in infrastructure mode. The related nodes could be at risk of security attacks.
Asmaa Akram Ghanim +1 more
doaj +1 more source
Dynamic Watermarking for Finite Markov Decision Processes
Dynamic watermarking is an active intrusion detection technique that can potentially detect replay attacks, spoofing attacks, and deception attacks in the feedback channel for control systems.
Jiacheng Tang +2 more
doaj +1 more source
Ack Spoofing Attack in IEEE 802.11 Infrastructure WLANs: Strategies, Detection and Mitigation
This paper investigates a vulnerability in IEEE 802.11 wireless local area networks, focusing on a MAC sublayer attack known as acknowledgement (Ack) spoofing.
Ayat Al‐Wraikat +2 more
doaj +1 more source
Analyzing the effect of reasoning-based supervision on face anti-spoofing. [PDF]
Min J +6 more
europepmc +1 more source
A hybrid deep learning and residual connection-based architecture for intrusion detection in autonomous vehicles. [PDF]
Kibriya H +5 more
europepmc +1 more source

