Results 141 to 150 of about 22,758 (191)

Gait biometrics under spoofing attacks: an experimental investigation

Journal of Electronic Imaging, 2015
Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the ...
Hadid, Abdenour   +5 more
openaire   +2 more sources

Classification of Spoofing Attack Types

2018 European Navigation Conference (ENC), 2018
All spoofer attacks have different requirements, impacts, success rates and objectives; therefore, to assess the threat and to develop appropriate counter measures, a clear classification is needed. Being aware of the different existing types of threats, allows an improved design of preventative measures to counter these attacks.
J. Rossouw van der Merwe   +4 more
openaire   +1 more source

Quickest detection of GPS spoofing attack

MILCOM 2012 - 2012 IEEE Military Communications Conference, 2012
GPS is being increasingly used in critical infrastructures in modern society. Therefore, the reliability of GPS is extremely important. Recently, the vulnerability of GPS to a spoofing attack has been discussed in the literature. A malicious attacker may spoof a GPS receiver, causing it to provide incorrect navigation and timing information, which may ...
Zhenghao Zhang   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy