Results 151 to 160 of about 22,160 (195)
Optimal attention deep learning based in-vehicle intrusion detection and classification model on CAN messages. [PDF]
Saravanan R +4 more
europepmc +1 more source
Adaptive bit placement for dual biometric using signature and finger print for DWT-DCT picture steganography. [PDF]
Bhattacharya A +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2018 IEEE 4th International Conference on Computer and Communications (ICCC), 2018
This paper investigates the requirements of spoofing attack on multiple drones which are navigated by GPS signals and can communicate with each other. Moreover, the performance of spoofing attack with different numbers of counterfeit signals is studied.
Zhang Renyu +3 more
openaire +3 more sources
This paper investigates the requirements of spoofing attack on multiple drones which are navigated by GPS signals and can communicate with each other. Moreover, the performance of spoofing attack with different numbers of counterfeit signals is studied.
Zhang Renyu +3 more
openaire +3 more sources
Detecting and Localizing Wireless Spoofing Attacks
2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2007Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. Although the identity of a node can be verified through cryptographic authentication, authentication is not always possible because it requires key management and additional infrastructural overhead.
Yingying Chen 0001 +2 more
openaire +1 more source
Quickest detection of GPS spoofing attack
MILCOM 2012 - 2012 IEEE Military Communications Conference, 2012GPS is being increasingly used in critical infrastructures in modern society. Therefore, the reliability of GPS is extremely important. Recently, the vulnerability of GPS to a spoofing attack has been discussed in the literature. A malicious attacker may spoof a GPS receiver, causing it to provide incorrect navigation and timing information, which may ...
Zhenghao Zhang +3 more
openaire +1 more source
On the Limitations of GPS Time-Spoofing Attacks
2020 43rd International Conference on Telecommunications and Signal Processing (TSP), 2020In recent years, there has been a number of incidents against the security of the location services. Jamming and spoofing attacks are intensively studied to find effective detection and mitigation techniques to provide secure signaling. However, the effects of the number of spoofing signals are not completely understood yet.
Mehmet Özgün Demir +2 more
openaire +2 more sources
On mitigation of pilot spoofing attack
2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017In a time-division duplex (TDD) multiple antenna system, the channel state information (CSI) can be estimated using reverse training. A pilot contamination (spoofing) attack occurs when during the training phase, an adversary also sends identical training (pilot) signal as that of the legitimate receiver. This contaminates channel estimation and alters
openaire +1 more source
On Iris Spoofing Using Print Attack
2014 22nd International Conference on Pattern Recognition, 2014Human iris contains rich textural information which serves as the key information for biometric identifications. It is very unique and one of the most accurate biometric modalities. However, spoofing techniques can be used to obfuscate or impersonate identities and increase the risk of false acceptance or false rejection.
Priyanshu Gupta +3 more
openaire +1 more source

