Year of publication
Type of media
Type of material
Licence
Language
1–20 of 146 hits
Sort by:
Sort by:
-
Spoofing and countermeasures for speaker verification: A survey
Elsevier | 2014|Keywords: Spoofing attack -
On the study of replay and voice conversion attacks to text-dependent speaker verification
Online Contents | 2015|Keywords: Spoofing attack -
On the study of replay and voice conversion attacks to text-dependent speaker verification
Online Contents | 2015|Keywords: Spoofing attack -
Fuzzy-based acquisition in GPS receivers for spoofing mitigation
Elsevier | 2023|Keywords: Spoofing attack -
Pilot spoofing detection for massive MIMO mmWave communication systems with a cooperative relay
Elsevier | 2023|Keywords: Pilot spoofing attack -
Cryptanalysis and Improvement of a Mobile Dynamic ID Authenticated Key Agreement Scheme Based on Chaotic Maps
Online Contents | 2015|Keywords: User spoofing attack -
Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks
Elsevier | 2016|Keywords: Spoofing attack -
Multi-level self-attentive TDNN: A general and efficient approach to summarize speech into discriminative utterance-level representations
Elsevier | 2022|Keywords: Spoofing attack detection -
Detection of pilot spoofing attack in massive MIMO systems based on channel estimation
Elsevier | 2019|Keywords: Pilot spoofing attack -
Salient Features Selection Techniques for Instruction Detection in Mobile Ad Hoc Networks
Free accessBASE | 2022|Keywords: Spoofing attack -
Salient Features Selection Techniques for Instruction Detection in Mobile Ad Hoc Networks
Free accessDOAJ | 2022|Keywords: Spoofing attack -
Mitigating Spoofed GNSS Trajectories through Nature Inspired Algorithm
Online Contents | 2020|Keywords: Spoofing attack -
Cryptanalysis and Improvement of a Mobile Dynamic ID Authenticated Key Agreement Scheme Based on Chaotic Maps
Online Contents | 2015|Keywords: User spoofing attack -
Data-driven detection for GPS spoofing attack using phasor measurements in smart grid
Elsevier | 2021|Keywords: GPS spoofing attack -
Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment
Online Contents | 2012|Keywords: Server spoofing attack -
DeepPOSE: Detecting GPS spoofing attack via deep recurrent neural network
Free accessDOAJ | 2022|Keywords: GPS spoofing attack -
Development of a Model for Spoofing Attacks in Internet of Things
Free accessDOAJ | 2022|Keywords: spoofing attack -
Replay attack detection based on distortion by loudspeaker for voice authentication
Online Contents | 2018|Keywords: Spoofing attack -
Replay attack detection based on distortion by loudspeaker for voice authentication
Online Contents | 2018|Keywords: Spoofing attack -
A Lightweight Defense Approach to Mitigate Version Number and Rank Attacks in Low-Power and Lossy Networks
Online Contents | 2018|Keywords: Rank spoofing attack
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.