Results 61 to 70 of about 22,758 (191)

Physical Layer Spoofing Against Eavesdropping Attacks

open access: yes2019 8th Mediterranean Conference on Embedded Computing (MECO), 2019
In this work, we propose a defense mechanism against an eavesdropper attack with the help of a spoofer node. The purpose of the legitimate transmitter is to send a confidential message without revealing it to the eavesdropper. The spoofer node aims at masking the transmission of the confidential message by emitting a falsifying signal.
Topal, Ozan Alp   +6 more
openaire   +2 more sources

Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal. [PDF]

open access: yesSensors (Basel), 2020
Gluck T   +4 more
europepmc   +1 more source

The 2nd competition on counter measures to 2D face spoofing attacks

open access: gold, 2013
Ivana Chingovska   +34 more
openalex   +2 more sources

The Impact of Spoofing Attacks in Connected Autonomous Vehicles under Traffic Congestion Conditions [PDF]

open access: gold
Zisis-Rafail Tzoannos   +3 more
openalex   +1 more source

Home - About - Disclaimer - Privacy