Results 41 to 50 of about 22,160 (195)
GNSS Spoofing Detection Using Q Channel Energy
Spoofing interference poses a significant challenge to the Global Navigation Satellite System (GNSS). To effectively combat intermediate spoofing signals, this paper presents an enhanced spoofing detection method based on abnormal energy of the ...
Jiaqi Wang +5 more
doaj +1 more source
Characterization and detection of location spoofing attacks
With the proliferation of diverse wireless devices, there is an increasing concern about the security of location information which can be spoofed or disrupted by adversaries. This paper investigates the characterization and detection of location spoofing attacks, specifically those which are attempting to falsify (degrade) the position estimate ...
Jeong Heon Lee, R. Michael Buehrer
openaire +1 more source
Foundations of GNSS Spoofing Detection and Mitigation with Distributed GNSS SDR Receiver [PDF]
GNSS spoofing is an intentional and malicious action aimed at degrading and suppressing GNSS Positioning, Navigation, and Timing (PNT) services. Since it affects data and information segment of GNSS, it is considered a GNSS information (cyber-) security ...
Mia Filic
doaj +1 more source
Detection and Mitigation of GNSS Spoofing Attacks in Maritime Environments Using a Genetic Algorithm
Due to the high reliance of daily activities on the Global Navigation Satellite System (GNSS), its security is one of the major concerns for research and industry. Most navigation and mobile-driven location-based services use GNSS to render services. Due
Saravjeet Singh +6 more
doaj +1 more source
The Texas Spoofing Test Battery: Toward a Standard for Evaluating GPS Signal Authentication Techniques [PDF]
A battery of recorded spoofing scenarios has been compiled for evaluating civil Global Positioning System (GPS) signal authentication techniques. The battery can be considered the data component of an evolving standard meant to define the notion of ...
Bhatti, Jahshan A. +3 more
core +1 more source
Presentations and attacks, and spoofs, oh my [PDF]
Abstract “Presentation attacks” are attacks at a biometric recognition data capture sensor which interfere with its normal operation. When artificial materials are used to create a fake biometric characteristic, it has been more commonly termed spoofing and the artifacts used to attack the system have been called spoofs.
openaire +1 more source
A New Replay Attack Against Automatic Speaker Verification Systems
With the increasing popularity of automatic speaker verification (ASV), the reliability of ASV systems has also gained importance. ASV is vulnerable to various spoofing attacks, especially replay attacks.
Sung-Hyun Yoon +3 more
doaj +1 more source
Audio-replay attack detection countermeasures
This paper presents the Speech Technology Center (STC) replay attack detection systems proposed for Automatic Speaker Verification Spoofing and Countermeasures Challenge 2017.
Kozlov, Alexander +5 more
core +1 more source
GPS Spoofing Attacks on Autonomous Navigation Systems for UAVs
Recently, autonomous navigation systems in UAV have been rapidly adopted. however, there is a lack of research on GPS spoofing attack against autonomous navigation for UAVs.
Ji Hyuk Jung, Mi Yeon Hong, Ji Won Yoon
doaj +1 more source
Cross‐ethnicity face anti‐spoofing recognition challenge: A review
Face anti‐spoofing is critical to prevent face recognition systems from a security breach. The biometrics community has achieved impressive progress recently due to the excellent performance of deep neural networks and the availability of large datasets.
Ajian Liu +15 more
doaj +1 more source

