Results 11 to 20 of about 23,142 (187)
Use of Supervised Machine Learning for GNSS Signal Spoofing Detection with Validation on Real-World Meaconing and Spoofing Data—Part I [PDF]
The vulnerability of the Global Navigation Satellite System (GNSS) open service signals to spoofing and meaconing poses a risk to the users of safety-of-life applications.
Silvio Semanjski +3 more
doaj +2 more sources
An Anomaly Detection Approach to Face Spoofing Detection: A New Formulation and Evaluation Protocol
Face spoofing detection is commonly formulated as a two-class recognition problem where relevant features of both positive (real access) and negative samples (spoofing attempts) are utilized to train the system. However, the diversity of spoofing attacks,
Shervin Rahimzadeh Arashloo +2 more
doaj +3 more sources
GNSS Spoofing Detection and Mitigation Based on Maximum Likelihood Estimation [PDF]
Fei Wang, Mingquan Lu
exaly +2 more sources
Detection and Orientation of GNSS Spoofing Based on Positioning Solutions of Three Receivers
Spoofing poses a serious security threat to the satellite navigation system. Most of the current spoofing detection methods are based on the information in the receiver-solving process.
Shimiao Chen +5 more
doaj +1 more source
Spoofing interference is one of the most emerging threats to the Global Navigation Satellite System (GNSS); therefore, the research on anti-spoofing technology is of great significance to improving the security of GNSS.
Xinran Zhang +5 more
doaj +1 more source
Recent Advances on Jamming and Spoofing Detection in GNSS [PDF]
Katarina Rados, Dinko Begušić
exaly +2 more sources
Detecting spoofed packets [PDF]
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of this address is not verified by the protocol. The IP protocol specifies no method for validating the authenticity of the packet's source.
Steven J. Templeton, Karl E. Levitt
openaire +1 more source
Spoofing Attack Detection by Anomaly Detection [PDF]
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this paper we focus on face spoofing detection. The majority of papers on spoofing attack detection formulate the problem as a two or multiclass learning task, attempting to separate normal accesses from samples of different types of spoofing attacks.
Fatemifar, Soroush +3 more
openaire +3 more sources
Efficient Face Spoofing Detection With Flash [PDF]
In light of the rising demand for biometric-authentication systems, preventing face spoofing attacks is a critical issue for the safe deployment of face recognition systems. Here, we propose an efficient face presentation attack detection (PAD) algorithm that requires minimal hardware and only a small database, making it suitable for resource ...
Akinori F. Ebihara +2 more
openaire +1 more source
Deep Learning Detection of GPS Spoofing
Unmanned aerial vehicles (UAVs) are widely deployed in air navigation, where numerous applications use them for safety-of-life and positioning, navigation, and timing tasks. Consequently, GPS spoofing attacks are more and more frequent. The aim of this work is to enhance GPS systems of UAVs, by providing the ability of detecting and preventing spoofing
Jullian Parra, Olivia +5 more
openaire +1 more source

