Results 71 to 80 of about 22,160 (195)

A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments

open access: yesInternational Journal of Network Management, Volume 36, Issue 3, May/June 2026.
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca   +6 more
wiley   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, Volume 43, Issue 3, Page 2254-2341, May 2026.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Resilient and Decentralized Control of Multi-level Cooperative Mobile Networks to Maintain Connectivity under Adversarial Environment

open access: yes, 2016
Network connectivity plays an important role in the information exchange between different agents in the multi-level networks. In this paper, we establish a game-theoretic framework to capture the uncoordinated nature of the decision-making at different ...
Chen, Juntao, Zhu, Quanyan
core   +1 more source

On the vulnerability of palm vein recognition to spoofing attacks [PDF]

open access: yes2015 International Conference on Biometrics (ICB), 2015
The vulnerability of palm vein recognition to spoofing attacks is studied in this paper. A collection of spoofing palm vein images has been created from real palm vein samples. Palm vein images are printed using a commercial printer and then, presented at a contactless palm vein sensor.
Pedro Tome, Sébastien Marcel
openaire   +1 more source

On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection

open access: yesExpert Systems, Volume 43, Issue 5, May 2026.
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López   +3 more
wiley   +1 more source

Teasers on Various Spoofing Attacks

open access: yesIOSR Journal of Computer Engineering, 2014
This paper proposed to give in depth survey on types of spoofing attacks. Spoofing is a way of masquerading identity of a person or a computer by providing fake data. In this paper huge variety of spoofing methods which includes brief introduction of Dns, Ip, Email, Arp, Web, Wireless, Mac spoofing.
Nikitha N, Maria krupa A, Rajeswari S
openaire   +1 more source

Ruthenium Nanoparticle‐On‐Cavity Refractory Thermoplasmonics for Broadband and Spectral‐Selective Solar Photothermal Conversion

open access: yesAdvanced Photonics Research, Volume 7, Issue 4, April 2026.
We identify ruthenium as a refractory plasmonic material exhibiting dual ENZ optical topological transitions and dual plasmonic resonances spanning from visible to infrared region with high imaginary permittivity. We establish a nanoparticle‐on‐cavity (NPoC) resonance mode and realize a NPoC selective solar absorber using cost‐effective additive ...
Zhequn Huang   +4 more
wiley   +1 more source

Fast Sequence Component Analysis for Attack Detection in Synchrophasor Networks [PDF]

open access: yes, 2015
Modern power systems have begun integrating synchrophasor technologies into part of daily operations. Given the amount of solutions offered and the maturity rate of application development it is not a matter of "if" but a matter of "when" in regards to ...
Barella, Richard   +6 more
core   +2 more sources

A Study on Replay Attack and Anti-Spoofing for Automatic Speaker Verification

open access: yes, 2017
For practical automatic speaker verification (ASV) systems, replay attack poses a true risk. By replaying a pre-recorded speech signal of the genuine speaker, ASV systems tend to be easily fooled.
Chen, Yixiang   +3 more
core   +1 more source

Launching Email Spoofing Attacks

open access: yesInternational Journal of Computer Applications, 2010
To launch a spoofing attack with emails we need to have knowledge of the techniques to launch an email spoofing attack. Spoofing has been widely discussed in documents on the Internet. Email spoofing is termed as an attack on email users who are sent emails from email addresses that are fake or altered.
Kunal Pandove   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy