Results 161 to 170 of about 22,160 (195)
Some of the next articles are maybe not open access.
Spoof Attacks on Gait Authentication System
IEEE Transactions on Information Forensics and Security, 2007Research in biometric gait recognition has increased. Earlier gait recognition works reported promising results, usually with a small sample size. Recent studies with a larger sample size confirm gait potential as a biometric from which individuals can be identified.
Davrondzhon Gafurov +2 more
openaire +1 more source
Spoofprint: A New Paradigm for Spoofing Attacks Detection
2021 IEEE Spoken Language Technology Workshop (SLT), 2021With the development of voice spoofing techniques, voice spoofing attacks have become one of the main threats to automatic speaker verification (ASV) systems. Traditionally, researchers tend to treat this problem as a binary classification task. A binary classifier is typically trained using machine learning (including deep learning) algorithms to ...
Tianxiang Chen, Elie Khoury 0001
openaire +1 more source
Detection and mitigation of pilot spoofing attack
2017 51st Asilomar Conference on Signals, Systems, and Computers, 2017In a time-division duplex (TDD) multiple antenna system, the channel state information (CSI) can be estimated using reverse training. A pilot contamination (spoofing) attack occurs when during the training phase, an adversary (spoofer) also sends identical training (pilot) signal as that of the legitimate receiver.
openaire +1 more source
Classification of Spoofing Attack Types
2018 European Navigation Conference (ENC), 2018All spoofer attacks have different requirements, impacts, success rates and objectives; therefore, to assess the threat and to develop appropriate counter measures, a clear classification is needed. Being aware of the different existing types of threats, allows an improved design of preventative measures to counter these attacks.
J. Rossouw van der Merwe +4 more
openaire +1 more source
Gait biometrics under spoofing attacks: an experimental investigation
Journal of Electronic Imaging, 2015Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the ...
Abdenour Hadid +5 more
openaire +2 more sources
Web spoofing and phishing attacks and their prevention
Proceedings of the Fifth Mexican International Conference in Computer Science, 2004. ENC 2004., 2004The main security mechanism for web surfing is the SSL/TLS protocol. This is a good tool, but, it has limitations and should be used carefully. We discuss the main limitations and weaknesses of SSL/TLS as currently implemented in browsers, and show how they are exploited in spoofing (site impersonation) and phishing (scam sites) attacks.
openaire +1 more source
Physical Layer Spoofing Against Eavesdropping Attacks
2019 8th Mediterranean Conference on Embedded Computing (MECO), 2019In this work, we propose a defense mechanism against an eavesdropper attack with the help of a spoofer node. The purpose of the legitimate transmitter is to send a confidential message without revealing it to the eavesdropper. The spoofer node aims at masking the transmission of the confidential message by emitting a falsifying signal.
Ozan Alp Topal +6 more
openaire +1 more source
A Physical Layer Spoofing Attack in Spatial Modulation
2019 IEEE Globecom Workshops (GC Wkshps), 2019Spoofing is a general attack in wireless communication and can cause further attacks like denial of service, node hijack and so on. Extensive studies have focused on the performance analysis under specific spoofing attack, or the countermeasures to detect and remove the spoofing attacks. Modulation based spoofing has proven to be an effective attack at
Xiaohui Wang +3 more
openaire +1 more source
Learn ARP Spoofing Attack in a Game
2022 IEEE Frontiers in Education Conference (FIE), 2022Jinsheng Xu +4 more
openaire +1 more source
A survey: Spoofing attacks in physical layer security
2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops), 2015Increasing demand on wireless communications also increases the issues related to communication security. Among different security solutions, physical layer security have recently been gaining many interests by the researchers. In this paper, a survey study is provided in one of the most critical attacks, namely spoofing attacks.
Mustafa Harun Yilmaz, Hüseyin Arslan
openaire +2 more sources

