Results 171 to 180 of about 22,160 (195)
Some of the next articles are maybe not open access.
Location Spoofing Attack Detection in Wireless Networks
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010While significant research effort has been dedicated to wireless localization over the past decades, most aspects of location security have been overlooked. In particular, adversaries can take advantage of security vulnerabilities of current location systems to launch location spoofing attacks, thus disguising their position in the network.
Jeong Heon Lee, R. Michael Buehrer
openaire +1 more source
Location Spoofing Attacks on Autonomous Fleets
Proceedings Inaugural International Symposium on Vehicle Security & Privacy, 2023Jinghan Yang +2 more
openaire +1 more source
Detection of global positioning system spoofing attack on unmanned aerial vehicle system
Concurrency Computation Practice and Experience, 2022Chen Liang, Meixia Miao, Jianfeng Ma
exaly
Spoofing Attacks and Anti-Spoofing Methods for Face Authentication Over Smartphones
IEEE Communications Magazine, 2023Zheng Zheng +2 more
openaire +1 more source
Data Spoofing Attacks by IPv6 Tunnels
IEICE Transactions on Communications, 2013Yu Cui +4 more
openaire +1 more source
Controllable Wireless Spoofing Attack Based on Conditional BEGAN and Auxiliary Channel Sensing
Electronics (Switzerland), 2023Yan Zhang, Wancheng Zhang, Zunwen He
exaly
An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems
IEEE Transactions on Information Forensics and Security, 2015Qi Xiong +2 more
exaly

