Spoofing attack

Results: 127



#Item
1Computer network security / Security / Cyberwarfare / Finance / Spoofing attack / Spoofing / Spoof / Computer security / Speech synthesis / Biometrics / Robust random early detection / Speech technology

ASVspoof 2015: the First Automatic Speaker Verification Spoofing and Countermeasures Challenge Zhizheng Wu1 Tomi Kinnunen2 Nicholas Evans3 Junichi Yamagishi1

Add to Reading List

Source URL: www.cstr.inf.ed.ac.uk

Language: English - Date: 2015-09-29 11:06:25
2Network performance / Internet security / Denial-of-service attacks / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Packet loss / Throughput / Transmission Control Protocol / Measuring network throughput / IP address spoofing / TCP congestion control

2015 IEEE Symposium on Security and Privacy Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, †

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:08
3Computer network security / IP address spoofing / Spoofing attack / Wireless security / Wireless LAN / ARP spoofing / MAC address / IEEE 802.11 / Spoof / Computer network / MAC filtering / Computer security

Protecting Wireless Networks from Identity Theft (Spoofing) using the spatial correlation of received signal strength. GudipudiChandanaTheja MTech Student Dapartment of Computer Science Engineering ST.Mary’s Gr oup of

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-13 08:43:06
4Domain name system / Internet protocols / Internet Standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Denial-of-service attack / Name server / Localhost / DNS spoofing / Google Public DNS

University of Amsterdam System & Network Engineering RP1 Defending against DNS reflection amplification attacks February 14, 2013

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2013-02-14 04:49:27
5Computer network security / Navigation / Global Positioning System / Spoofing attack / GPS signals / Authentication / Satellite navigation / Computer security

15. SCPNT_Coop Authentication_Gao_2014.pptx

Add to Reading List

Source URL: scpnt.stanford.edu

Language: English - Date: 2014-11-10 19:11:29
6Computing / Security / Humancomputer interaction / Automatic identification and data capture / Computational linguistics / Speech processing / Computer network security / Computer accessibility / Speech recognition / Speaker recognition / Biometrics / Spoofing attack

Human vs Machine Spoofing Detection on Wideband and Narrowband Data Mirjam Wester1 , Zhizheng Wu1 , Junichi Yamagishi1,2 1 The Centre for Speech Technology Research, The University of Edinburgh, UK 2

Add to Reading List

Source URL: www.cstr.ed.ac.uk

Language: English - Date: 2015-09-29 11:06:25
7Computing / Internet / Cryptography / Cybercrime / Internet Standards / Internet protocols / Cyberwarfare / National security / Denial-of-service attack / Computer security / Border Gateway Protocol / DNS spoofing

Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents Yang Liu1 , Armin Sarabi1 , Jing Zhang1 , Parinaz Naghizadeh1 Manish Karir2 , Michael Bailey3 , Mingyan Liu1,2 1 EECS Department, University of Michiga

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2015-08-05 18:31:26
8Computer networking / Cache / Named data networking / DNS spoofing / Web cache / Content centric networking / Hypertext Transfer Protocol / Interest Flooding Attack / Forwarding plane / Probability distribution

Efficient Content Verification in Named Data Networking Dohyung Kim Sunwook Nam Sungkyunkwan University

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:11:48
9Surveillance / Security / Biometrics / Computer network security / Gait analysis / Orthopedic surgery / Spoofing attack / Gait / Facial recognition system / Locomotion / Medicine / Motion

Can Gait Biometrics be Spoofed?∗ A. Hadid, M. Ghahramani, V. Kellokumpu, M. Pietik¨ainen Center for Machine Vision Research, University of Oulu, Finland J. Bustard & M. Nixon School of Electronics and Computer Science

Add to Reading List

Source URL: www.ee.oulu.fi

Language: English - Date: 2012-04-06 05:12:29
10Network architecture / Domain Name System Security Extensions / DNS spoofing / Name server / Root name server / Extension mechanisms for DNS / Denial-of-service attack / Anycast / Load balancing / Internet / Computing / Domain name system

Fragmentation Considered Poisonous arXiv:1205.4011v1 [cs.CR] 17 May 2012 Amir Herzberg† and Haya Shulman‡ Dept. of Computer Science, Bar Ilan University

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2012-05-23 11:56:51
UPDATE