Results 151 to 160 of about 23,142 (187)
Some of the next articles are maybe not open access.
2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2015
Cyber forensics deals with the collection of digital artifacts from digital devices that can be presented in the court as evidence. There are many areas of cyber forensics. Some of these are Disk Forensics, Network Forensics, Mobile Forensics, Database Forensics, etc. This paper mainly focuses on E-mail Forensics coming under network forensics.
Aparna Jayan, S Dija
openaire +1 more source
Cyber forensics deals with the collection of digital artifacts from digital devices that can be presented in the court as evidence. There are many areas of cyber forensics. Some of these are Disk Forensics, Network Forensics, Mobile Forensics, Database Forensics, etc. This paper mainly focuses on E-mail Forensics coming under network forensics.
Aparna Jayan, S Dija
openaire +1 more source
Impact and Detection of GPS Spoofing and Countermeasures against Spoofing
2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), 2019As GPS signals are weak broad casted signal over wireless channels therefore they are vulnerable to in-band interference. Even a low power interference can spoof the GPS, which can cause destruction. Because of the above discussed reasons spoofing and anti-spoofing techniques are the emerging issues of the field of GPS.
Mukhtar Ahmad +5 more
openaire +1 more source
Detecting GNSS Spoofing using Temporal Behavior of Spoofed Signals
ION GNSS+, The International Technical Meeting of the Satellite Division of The Institute of Navigation, 2021In this paper, we propose a novel method to detect Global Navigation Satellite System (GNSS) spoofing using Inertial Navigation Systems (INS) based on inherent noise of spoofed signals. We showed in prior work [21] that a solution separation-based monitor provides detection capability for slowly growing faults.
Birendra Kujur +2 more
openaire +1 more source
Detecting and Localizing Wireless Spoofing Attacks
2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2007Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. Although the identity of a node can be verified through cryptographic authentication, authentication is not always possible because it requires key management and additional infrastructural overhead.
Yingying Chen 0001 +2 more
openaire +1 more source
Quickest detection of GPS spoofing attack
MILCOM 2012 - 2012 IEEE Military Communications Conference, 2012GPS is being increasingly used in critical infrastructures in modern society. Therefore, the reliability of GPS is extremely important. Recently, the vulnerability of GPS to a spoofing attack has been discussed in the literature. A malicious attacker may spoof a GPS receiver, causing it to provide incorrect navigation and timing information, which may ...
Zhenghao Zhang +3 more
openaire +1 more source
Deep features for automatic spoofing detection
Speech Communication, 2016Recently biometric authentication has made progress in areas, such as speaker verification. However, some evidence shows that the technology is susceptible to malicious spoofing attacks, and thus dedicated countermeasures are needed to detect a variety of specific attack types.
Yanmin Qian, Nanxin Chen, Kai Yu 0004
openaire +1 more source
Fingerprint Synthesis and Spoof Detection
2008This chapter addresses two topical issues in the field of fingerprint-based biometric systems: i) fingerprint templates reverse-engineering, that is, the synthesis of finger-print images starting from minutiae-based templates and ii) fake fingerprint detec-tion, that is discriminating between real and fake fingerprint impressions, the latter generated ...
FRANCO, ANNALISA, MALTONI, DAVIDE
openaire +2 more sources
2007
Biometrics is defined as an automated method of verifying or recognizing the identity of a living person based on physiological or behavioral characteristics [1]. While much research has been done both to determine which traits can differentiate humans and to optimize that differentiation, the problem of determining if the presented trait originates ...
Kristin Adair Nixon +2 more
openaire +1 more source
Biometrics is defined as an automated method of verifying or recognizing the identity of a living person based on physiological or behavioral characteristics [1]. While much research has been done both to determine which traits can differentiate humans and to optimize that differentiation, the problem of determining if the presented trait originates ...
Kristin Adair Nixon +2 more
openaire +1 more source
Face Spoofing Detection Using DenseNet
2021Today, face recognition is the most widely used biometric recognition technology. However, face recognition is a biometric method that is vulnerable to spoofing. Types of spoofing attack include print, replay, and 3D mask. Methods based on hand-crafted features such as local binary patterns which use high-frequency features of images, are therefore ...
Su-Gyeong Yu +3 more
openaire +1 more source
Spoof detection on face and palmprint biometrics
Signal, Image and Video Processing, 2017Spoofing attacks made by non-real images are a major concern to biometric systems. This paper presents a novel solution for distinguishing between live and forged identities using the fusion of texture-based methods and image quality assessment measures. In our approach, we used LBP and HOG texture descriptors to extract texture information of an image.
Mina Farmanbar, Önsen Toygar
openaire +1 more source

