Results 151 to 160 of about 23,142 (187)
Some of the next articles are maybe not open access.

Detection of spoofed mails

2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2015
Cyber forensics deals with the collection of digital artifacts from digital devices that can be presented in the court as evidence. There are many areas of cyber forensics. Some of these are Disk Forensics, Network Forensics, Mobile Forensics, Database Forensics, etc. This paper mainly focuses on E-mail Forensics coming under network forensics.
Aparna Jayan, S Dija
openaire   +1 more source

Impact and Detection of GPS Spoofing and Countermeasures against Spoofing

2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), 2019
As GPS signals are weak broad casted signal over wireless channels therefore they are vulnerable to in-band interference. Even a low power interference can spoof the GPS, which can cause destruction. Because of the above discussed reasons spoofing and anti-spoofing techniques are the emerging issues of the field of GPS.
Mukhtar Ahmad   +5 more
openaire   +1 more source

Detecting GNSS Spoofing using Temporal Behavior of Spoofed Signals

ION GNSS+, The International Technical Meeting of the Satellite Division of The Institute of Navigation, 2021
In this paper, we propose a novel method to detect Global Navigation Satellite System (GNSS) spoofing using Inertial Navigation Systems (INS) based on inherent noise of spoofed signals. We showed in prior work [21] that a solution separation-based monitor provides detection capability for slowly growing faults.
Birendra Kujur   +2 more
openaire   +1 more source

Detecting and Localizing Wireless Spoofing Attacks

2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2007
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. Although the identity of a node can be verified through cryptographic authentication, authentication is not always possible because it requires key management and additional infrastructural overhead.
Yingying Chen 0001   +2 more
openaire   +1 more source

Quickest detection of GPS spoofing attack

MILCOM 2012 - 2012 IEEE Military Communications Conference, 2012
GPS is being increasingly used in critical infrastructures in modern society. Therefore, the reliability of GPS is extremely important. Recently, the vulnerability of GPS to a spoofing attack has been discussed in the literature. A malicious attacker may spoof a GPS receiver, causing it to provide incorrect navigation and timing information, which may ...
Zhenghao Zhang   +3 more
openaire   +1 more source

Deep features for automatic spoofing detection

Speech Communication, 2016
Recently biometric authentication has made progress in areas, such as speaker verification. However, some evidence shows that the technology is susceptible to malicious spoofing attacks, and thus dedicated countermeasures are needed to detect a variety of specific attack types.
Yanmin Qian, Nanxin Chen, Kai Yu 0004
openaire   +1 more source

Fingerprint Synthesis and Spoof Detection

2008
This chapter addresses two topical issues in the field of fingerprint-based biometric systems: i) fingerprint templates reverse-engineering, that is, the synthesis of finger-print images starting from minutiae-based templates and ii) fake fingerprint detec-tion, that is discriminating between real and fake fingerprint impressions, the latter generated ...
FRANCO, ANNALISA, MALTONI, DAVIDE
openaire   +2 more sources

Spoof Detection Schemes

2007
Biometrics is defined as an automated method of verifying or recognizing the identity of a living person based on physiological or behavioral characteristics [1]. While much research has been done both to determine which traits can differentiate humans and to optimize that differentiation, the problem of determining if the presented trait originates ...
Kristin Adair Nixon   +2 more
openaire   +1 more source

Face Spoofing Detection Using DenseNet

2021
Today, face recognition is the most widely used biometric recognition technology. However, face recognition is a biometric method that is vulnerable to spoofing. Types of spoofing attack include print, replay, and 3D mask. Methods based on hand-crafted features such as local binary patterns which use high-frequency features of images, are therefore ...
Su-Gyeong Yu   +3 more
openaire   +1 more source

Spoof detection on face and palmprint biometrics

Signal, Image and Video Processing, 2017
Spoofing attacks made by non-real images are a major concern to biometric systems. This paper presents a novel solution for distinguishing between live and forged identities using the fusion of texture-based methods and image quality assessment measures. In our approach, we used LBP and HOG texture descriptors to extract texture information of an image.
Mina Farmanbar, Önsen Toygar
openaire   +1 more source

Home - About - Disclaimer - Privacy