<--- Back to Details
First PageDocument Content
Computational linguistics / Cyberwarfare / Human communication / Speech recognition / Biometrics / Speaker recognition / Speech synthesis / Spoofing attack / Attack / Computer network security / Automatic identification and data capture / Science
Date: 2013-10-07 08:11:17
Computational linguistics
Cyberwarfare
Human communication
Speech recognition
Biometrics
Speaker recognition
Speech synthesis
Spoofing attack
Attack
Computer network security
Automatic identification and data capture
Science

Add to Reading List

Source URL: www.cstr.ed.ac.uk

Download Document from Source Website

File Size: 336,77 KB

Share Document on Facebook

Similar Documents

Computer network security / Security / Cyberwarfare / Finance / Spoofing attack / Spoofing / Spoof / Computer security / Speech synthesis / Biometrics / Robust random early detection / Speech technology

ASVspoof 2015: the First Automatic Speaker Verification Spoofing and Countermeasures Challenge Zhizheng Wu1 Tomi Kinnunen2 Nicholas Evans3 Junichi Yamagishi1

DocID: 1pSMR - View Document

Network performance / Internet security / Denial-of-service attacks / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Packet loss / Throughput / Transmission Control Protocol / Measuring network throughput / IP address spoofing / TCP congestion control

2015 IEEE Symposium on Security and Privacy Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, †

DocID: 1pcUO - View Document

Computer network security / IP address spoofing / Spoofing attack / Wireless security / Wireless LAN / ARP spoofing / MAC address / IEEE 802.11 / Spoof / Computer network / MAC filtering / Computer security

Protecting Wireless Networks from Identity Theft (Spoofing) using the spatial correlation of received signal strength. GudipudiChandanaTheja MTech Student Dapartment of Computer Science Engineering ST.Mary’s Gr oup of

DocID: 1oWdd - View Document

Domain name system / Internet protocols / Internet Standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Denial-of-service attack / Name server / Localhost / DNS spoofing / Google Public DNS

University of Amsterdam System & Network Engineering RP1 Defending against DNS reflection amplification attacks February 14, 2013

DocID: 1oRiV - View Document

Computer network security / Navigation / Global Positioning System / Spoofing attack / GPS signals / Authentication / Satellite navigation / Computer security

15. SCPNT_Coop Authentication_Gao_2014.pptx

DocID: 1oMEd - View Document