The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for spoofing with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1988-2000 (16) 2001-2003 (17) 2004 (26) 2005 (33) 2006 (48) 2007 (44) 2008 (46) 2009 (33) 2010 (23) 2011 (28) 2012 (38) 2013 (47) 2014 (59) 2015 (93) 2016 (126) 2017 (136) 2018 (169) 2019 (229) 2020 (258) 2021 (263) 2022 (292) 2023 (307) 2024 (50)
Publication types (Num. hits)
article(1029) book(3) data(1) incollection(57) inproceedings(1281) phdthesis(10)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 302 occurrences of 168 keywords

Results
Found 2381 publication records. Showing 2381 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
143Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig BASE: an incrementally deployable mechanism for viable IP spoofing prevention. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF BGP anti-spoofing extension, packet marking and filtering, DDoS attack, IP spoofing
124Wei Chen, Dit-Yan Yeung Throttling spoofed SYN flooding traffic at the source. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hash-based detection, CUSUM, Bloom filter, DDoS, IP spoofing, SYN flooding
118Wei Chen, Dit-Yan Yeung Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing. Search on Bibsonomy ICN/ICONS/MCL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
114Toby Ehrenkranz, Jun Li 0001 On the state of IP spoofing defense. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF spoofing defense, spoofing packet, packet filtering, IP spoofing
113Xicheng Lu, Gaofeng Lü, Peidong Zhu, Yijiao Chen MASK: An efficient mechanism to extend inter-domain IP spoofing preventions. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IP spoofing prevention, BGP, DDoS
113Fang Qi, Feng Bao 0001, Tieyan Li, Weijia Jia 0001, Yongdong Wu Preventing Web-Spoofing with Automatic Detecting Security Indicator. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Automatic Detecting Security Indicator, SSL, Web Spoofing
96Rolf Oppliger, Sebastian Gajek Effective Protection Against Phishing and Web Spoofing. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF visual spoofing, phishing, SSL/TLS, Web spoofing
84Yan Shen, Jun Bi, Jianping Wu, Qiang Liu The Automatic Peer-to-Peer Signature for Source Address Validation. Search on Bibsonomy KES (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Source Address Spoofing, Spoofing Prevention, Key Management
77Jihyun Lee, Hyungyu Park, Kyungshik Lim Rate-Adaptive TCP Spoofing with Segment Aggregation over Asymmetric Long Delay Links. Search on Bibsonomy ICOIN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Rate-Adaptive TCP Spoofing, Segment Aggregation, Asymmetry Long Delay Link, TCP, PEP
71Yingying Chen 0001, Wade Trappe, Richard P. Martin Detecting and Localizing Wireless Spoofing Attacks. Search on Bibsonomy SECON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
66Zhenhai Duan, Xin Yuan 0001, Jaideep Chandrashekar Controlling IP Spoofing through Interdomain Packet Filters. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Infrastructure Protection, Routing Protocols, BGP, DDoS, Network-level security and protection, IP Spoofing
66Asier Martínez, Urko Zurutuza, Roberto Uribeetxeberria, Miguel Fernández, Jesus Lizarraga, Ainhoa Serna, Iñaki Vélez Beacon Frame Spoofing Attack Detection in IEEE 802.11 Networks. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF 802.11 MAC address spoofing, false positive
66Voravud Santiraveewan, Yongyuth Permpoontanalarp A Graph-based Methodology for Analyzing IP Spoofing Attack. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IP spoofing and Formal Method for Network Security, Network Security, Firewalls
65Roman V. Yampolskiy Mimicry Attack on Strategy-Based Behavioral Biometric. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Biometric, Behavior, Poker, Spoofing, Mimicry
64Dong Yi, Zhen Lei 0001, Zhiwei Zhang, Stan Z. Li Face Anti-spoofing: Multi-spectral Approach. Search on Bibsonomy Handbook of Biometric Anti-Spoofing The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
64John D. Bustard, Mohammad Ghahramani, John N. Carter, Abdenour Hadid, Mark S. Nixon Gait Anti-spoofing. Search on Bibsonomy Handbook of Biometric Anti-Spoofing The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
64André Anjos, Jukka Komulainen, Sébastien Marcel, Abdenour Hadid, Matti Pietikäinen Face Anti-spoofing: Visual Approach. Search on Bibsonomy Handbook of Biometric Anti-Spoofing The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
64Andrew P. Rebera Ethical Issues in Anti-spoofing. Search on Bibsonomy Handbook of Biometric Anti-Spoofing The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
64Giorgio Fumera, Gian Luca Marcialis, Battista Biggio, Fabio Roli, Stephanie A. C. Schuckers Multimodal Anti-spoofing in Biometric Recognition Systems. Search on Bibsonomy Handbook of Biometric Anti-Spoofing The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
64Nicholas W. D. Evans, Tomi Kinnunen, Junichi Yamagishi, Zhizheng Wu 0001, Federico Alegre, Phillip L. De Leon Speaker Recognition Anti-spoofing. Search on Bibsonomy Handbook of Biometric Anti-Spoofing The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
64Javier Galbally, Julian Fiérrez-Aguilar, Javier Ortega-Garcia, Raffaele Cappelli Fingerprint Anti-spoofing in Biometric Systems. Search on Bibsonomy Handbook of Biometric Anti-Spoofing The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
64Zhenan Sun, Tieniu Tan Iris Anti-spoofing. Search on Bibsonomy Handbook of Biometric Anti-Spoofing The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
59Yan Shen, Jun Bi, Jianping Wu, Qiang Liu A two-level source address spoofing prevention based on automatic signature and verification mechanism. Search on Bibsonomy ISCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
59Vivek Ramachandran, Sukumar Nandi Detecting ARP Spoofing: An Active Technique. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
59José Meseguer 0001, Ralf Sasse, Helen J. Wang, Yi-Min Wang A Systematic Approach to Uncover Security Flaws in GUI Logic. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
59Fanglu Guo, Tzi-cker Chiueh Sequence Number-Based MAC Address Spoof Detection. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Wireless LAN MAC spoof detection, WLAN monitoring and intrusion detection, Sequence number
54Christian Schridde, Matthew Smith 0001, Bernd Freisleben TrueIP: prevention of IP spoofing attacks using identity-based cryptography. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network security, denial-of-service, signatures, identity-based cryptography, IP spoofing
54Jun Bi, Jianping Wu, Miao Zhang Enable a Trustworthy Network by Source Address Spoofing Prevention Routers: A Formal Description. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Source Address Spoofing, Source Address Validation, Network Security
54Robert Beverly, Arthur W. Berger, Young Hyun, kc claffy Understanding the efficacy of deployed internet source address validation filtering. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ip spoofing, source address validation, filtering
52Christoph Busch 0001 Related Standards. Search on Bibsonomy Handbook of Biometric Anti-Spoofing The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
52Ivana Chingovska, André Anjos, Sébastien Marcel Evaluation Methodologies. Search on Bibsonomy Handbook of Biometric Anti-Spoofing The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
52Nesli Erdogmus, Sébastien Marcel Introduction. Search on Bibsonomy Handbook of Biometric Anti-Spoofing The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
52 Impact of artificial gummy fingers on fingerprint systems. Search on Bibsonomy Handbook of Biometric Anti-Spoofing The full citation details ... 2014 DBLP  BibTeX  RDF
52Christophe Champod, Marcela Espinoza Forgeries of Fingerprints in Forensic Science. Search on Bibsonomy Handbook of Biometric Anti-Spoofing The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
52Els J. Kindt Legal Aspects: Biometric Data, Evidence Rules and Trusted Identities. Search on Bibsonomy Handbook of Biometric Anti-Spoofing The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
49Mingjiang Ye, Jianping Wu, Miao Zhang Experience with SPM in IPv6. Search on Bibsonomy International Conference on Computational Science (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Source Address Spoofing, Spoofing Prevention, Security
47Jeffrey Horton, Jennifer Seberry Covert Distributed Computing Using Java Through Web Spoofing. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
47Fang Qi, Zhe Tang, Guojun Wang 0001 Attacks vs. Countermeasures of SSL Protected Trust Model. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
47Richa Bansal, Siddharth Tiwari, Divya Bansal Non-cryptographic methods of MAC spoof detection in wireless LAN. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Fan Min 0001, Jun-yan Zhang, Guo-wie Yang An IP Traceback Scheme Integrating DPM and PPM. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Deterministic Packet Marking, Denial of Service, IP traceback, IP spoofing, Probabilistic Packet Marking
40Javier Hernandez-Ortega, Julian Fiérrez, Aythami Morales, Javier Galbally Introduction to Face Presentation Attack Detection. Search on Bibsonomy Handbook of Biometric Anti-Spoofing, 2nd Ed. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40Ivana Chingovska, Amir Mohammadi, André Anjos, Sébastien Marcel Evaluation Methodologies for Biometric Presentation Attack Detection. Search on Bibsonomy Handbook of Biometric Anti-Spoofing, 2nd Ed. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40Ruben Tolosana, Rubén Vera-Rodríguez, Julian Fiérrez, Javier Ortega-Garcia Presentation Attacks in Signature Biometrics: Types and Introduction to Attack Detection. Search on Bibsonomy Handbook of Biometric Anti-Spoofing, 2nd Ed. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40Christoph Busch 0001 Standards for Biometric Presentation Attack Detection. Search on Bibsonomy Handbook of Biometric Anti-Spoofing, 2nd Ed. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40Adam Czajka, Benedict Becker Application of Dynamic Features of the Pupil for Iris Presentation Attack Detection. Search on Bibsonomy Handbook of Biometric Anti-Spoofing, 2nd Ed. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40Guillaume Heusch, Sébastien Marcel Remote Blood Pulse Analysis for Face Presentation Attack Detection. Search on Bibsonomy Handbook of Biometric Anti-Spoofing, 2nd Ed. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40Jukka Komulainen, Zinelabidine Boulkenafet, Zahid Akhtar Review of Face Presentation Attack Detection Competitions. Search on Bibsonomy Handbook of Biometric Anti-Spoofing, 2nd Ed. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40Md. Sahidullah, Héctor Delgado, Massimiliano Todisco, Tomi Kinnunen, Nicholas W. D. Evans, Junichi Yamagishi, Kong-Aik Lee Introduction to Voice Presentation Attack Detection and Recent Advances. Search on Bibsonomy Handbook of Biometric Anti-Spoofing, 2nd Ed. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40Pavel Korshunov, Sébastien Marcel A Cross-Database Study of Voice Presentation Attack Detection. Search on Bibsonomy Handbook of Biometric Anti-Spoofing, 2nd Ed. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40Javier Galbally, Julian Fiérrez, Raffaele Cappelli An Introduction to Fingerprint Presentation Attack Detection. Search on Bibsonomy Handbook of Biometric Anti-Spoofing, 2nd Ed. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40David Yambay, Adam Czajka, Kevin W. Bowyer, Mayank Vatsa, Richa Singh 0001, Afzel Noore, Naman Kohli, Daksha Yadav, Stephanie Schuckers Review of Iris Presentation Attack Detection Competitions. Search on Bibsonomy Handbook of Biometric Anti-Spoofing, 2nd Ed. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40André Anjos, Pedro Tome, Sébastien Marcel An Introduction to Vein Presentation Attacks and Detection. Search on Bibsonomy Handbook of Biometric Anti-Spoofing, 2nd Ed. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40Aythami Morales, Julian Fiérrez, Javier Galbally, Marta Gomez-Barrero Introduction to Iris Presentation Attack Detection. Search on Bibsonomy Handbook of Biometric Anti-Spoofing, 2nd Ed. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40Kiran B. Raja, Ramachandra Raghavendra, Sushma Venkatesh, Marta Gomez-Barrero, Christian Rathgeb, Christoph Busch 0001 A Study of Hand-Crafted and Naturally Learned Features for Fingerprint Presentation Attack Detection. Search on Bibsonomy Handbook of Biometric Anti-Spoofing, 2nd Ed. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40Els J. Kindt A Legal Perspective on the Relevance of Biometric Presentation Attack Detection (PAD) for Payment Services Under PSDII and the GDPR. Search on Bibsonomy Handbook of Biometric Anti-Spoofing, 2nd Ed. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40Ivan Himawan, Srikanth R. Madikeri, Petr Motlícek, Milos Cernak, Sridha Sridharan, Clinton Fookes Voice Presentation Attack Detection Using Convolutional Neural Networks. Search on Bibsonomy Handbook of Biometric Anti-Spoofing, 2nd Ed. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40David Yambay, Luca Ghiani, Gian Luca Marcialis, Fabio Roli, Stephanie Schuckers Review of Fingerprint Presentation Attack Detection Competitions. Search on Bibsonomy Handbook of Biometric Anti-Spoofing, 2nd Ed. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40Artur Costa-Pazo, Esteban Vázquez-Fernández, José Luis Alba-Castro, Daniel González-Jiménez Challenges of Face Presentation Attack Detection in Real Scenarios. Search on Bibsonomy Handbook of Biometric Anti-Spoofing, 2nd Ed. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40Si-Qi Liu 0003, Pong C. Yuen, Xiaobai Li, Guoying Zhao 0001 Recent Progress on Face Presentation Attack Detection of 3D Mask Attacks. Search on Bibsonomy Handbook of Biometric Anti-Spoofing, 2nd Ed. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40Sushil Bhattacharjee, Amir Mohammadi, André Anjos, Sébastien Marcel Recent Advances in Face Presentation Attack Detection. Search on Bibsonomy Handbook of Biometric Anti-Spoofing, 2nd Ed. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40Pierluigi Tuveri, Luca Ghiani, Mikel Zurutuza, Valerio Mura, Gian Luca Marcialis Interoperability Among Capture Devices for Fingerprint Presentation Attacks Detection. Search on Bibsonomy Handbook of Biometric Anti-Spoofing, 2nd Ed. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40Yaseen Moolla, Luke Nicholas Darlow, Ameeth Sharma, Ann Singh, Johan Van Der Merwe Optical Coherence Tomography for Fingerprint Presentation Attack Detection. Search on Bibsonomy Handbook of Biometric Anti-Spoofing, 2nd Ed. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
37Gian Luca Marcialis, Aaron Lewicke, Bozhao Tan, Pietro Coli, Dominic Grimberg, Alberto Congiu, Alessandra Tidu, Fabio Roli, Stephanie A. C. Schuckers First International Fingerprint Liveness Detection Competition - LivDet 2009. Search on Bibsonomy ICIAP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anti-spoofing protection, security, biometrics, Fingerprint, spoofing, liveness detection
37Aniello Castiglione, Roberto De Prisco, Alfredo De Santis Do You Trust Your Phone? Search on Bibsonomy EC-Web The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SMS security, mobile malware, telephone phishing, telephone pharming, caller ID spoofing, SMS spoofing, NGN, identity theft, untraceability, VoIP security
36Yong Sheng, Keren Tan, Guanling Chen, David Kotz, Andrew T. Campbell Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Qing Li 0034, Wade Trappe Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Viktor Krammer Phishing defense against IDN address spoofing attacks. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF usability, web browsers, phishing, internet security, unicode, internationalized domain names
36Anat Bremler-Barr, Hanoch Levy Spoofing prevention method. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Mihui Kim, Kijoon Chae A Fast Defense Mechanism Against IP Spoofing Traffic in a NEMO Environment. Search on Bibsonomy ICOIN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Leonid M. Tombak, Reihaneh Safavi-Naini Authentication Codes That Are r-Fold Secure Against Spoofing. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF r-fold security, authentication, cryptography, computer security, authentication codes
35Kashif Ali, Mohammad Zulkernine, Hossam S. Hassanein Packet Filtering Based on Source Router Marking and Hop-Count. Search on Bibsonomy LCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Hyuncheol Kim, Seong-Jin Ahn 0001, Jun Kyun Choi Performance Analysis of Dynamic Host Isolation System in Wireless Mobile Networks. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Amir Herzberg, Ahmad Jbara Security and identification indicators for browsers against spoofing and phishing attacks. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Human-computer interaction, phishing, secure usability, Web spoofing
31Lizhong Xie, Jun Bi, Jianping Wu An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network. Search on Bibsonomy International Conference on Computational Science (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Source Address Spoofing, Edge Network, IPv6
31Anat Bremler-Barr, Hanoch Levy Brief announcement: spoofing prevention method. Search on Bibsonomy PODC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF source IP spoofing, distributed denial of service
30Ruishan Zhang, Xinyuan Wang 0005, Ryan Farley, Xiaohui Yang, Xuxian Jiang On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DNS spoofing, MITM attacks, SIP, VoIP security
30Dingyi Pei New Family of Non-Cartesian Perfect Authentication Codes. Search on Bibsonomy IWCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF perfect authentication codes, subfield rational normal curves, partially balanced designs, spoofing attacks
30Tae Hwan Kim, Dong Seong Kim 0001, Sang Min Lee 0012, Jong Sou Park Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Traffic visualization, Weighted moving average, Intrusion detection, Distributed Denial of Service attacks, Traffic matrix, IP spoofing
30Keisuke Takemori, Masahiko Fujinaga, Toshiya Sayama, Masakatsu Nishigaki Host-based traceback; tracking bot and C&C server. Search on Bibsonomy ICUIMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DNS reflection attack, host-based traceback, botnet, IP spoofing
30Suman Jana, Sneha Kumar Kasera On fast and accurate detection of unauthorized wireless access points using clock skews. Search on Bibsonomy MobiCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MAC address spoofing, fake access point, IEEE 802.11, fingerprint, timestamp
30Haining Wang, Cheng Jin, Kang G. Shin Defense against spoofed IP traffic using hop-count filtering. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF host-based, DDoS attacks, IP spoofing, hop-count
30Marwan Abi-Antoun, Daniel Wang, Peter Torr Checking threat modeling data flow diagrams for implementation conformance and security. Search on Bibsonomy ASE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF reflexion models, denial of service, security analysis, threat modeling, data flow diagrams, information disclosure, tampering, spoofing
30Birger Tödtmann, Erwin P. Rathgeb Anticipatory Distributed Packet Filter Configuration for Carrier-Grade IP-Networks. Search on Bibsonomy Networking The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network Security, Packet Filters, IP Spoofing, Critical Infrastructure Protection
30Changho Choi, Yingfei Dong, Zhi-Li Zhang LIPS: Lightweight Internet Permit System for Stopping Unwanted Packets. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Unwanted Packets, Network Security, Denial of Service, IP Spoofing
30Min-Hui Lin 0001, Chin-Chen Chang 0001 A secure one-time password authentication scheme with low-computation for mobile communications. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF off-line dictionary attack, server spoofing attack, authentication, smart card, replay attack, one-time password
24Shen Wang 0008, Mahshid Delavar, Muhammad Ajmal Azad, Farshad Nabizadeh, Steve Smith, Feng Hao 0001 Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems. Search on Bibsonomy ACM Trans. Priv. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
24Ji Hyuk Jung, Miyeon Hong, Hyeongjun Choi, Ji Won Yoon An Analysis of GPS Spoofing Attack and Efficient Approach to Spoofing Detection in PX4. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
24Bin Zhang, Xiangyu Zhu, Xiaoyu Zhang 0002, Zhen Lei 0001 Modeling Spoof Noise by De-spoofing Diffusion and its Application in Face Anti-spoofing. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
24Zheng Zheng, Qian Wang 0002, Cong Wang Spoofing Attacks and Anti-Spoofing Methods for Face Authentication Over Smartphones. Search on Bibsonomy IEEE Commun. Mag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Awais Khan 0007, Khalid Mahmood Malik, James Ryan, Mikul Saravanan Battling voice spoofing: a review, comparative analysis, and generalizability evaluation of state-of-the-art voice spoofing counter measures. Search on Bibsonomy Artif. Intell. Rev. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Shen Wang 0008, Mahshid Delavar, Muhammad Ajmal Azad, Farshad Nabizadeh, Steve Smith, Feng Hao 0001 Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Bin Zhang, Xiangyu Zhu, Xiaoyu Zhang 0002, Zhen Lei 0001 Modeling Spoof Noise by De-spoofing Diffusion and its Application in Face Anti-spoofing. Search on Bibsonomy IJCB The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Hande Isil Akçay, Tolga Girici, Emrah Onat Spoofing Detection and Anti-Spoofing Kalman Filter Design for an Accelerometer-Integrated GNSS Receiver. Search on Bibsonomy SIU The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Yangjun Gao, Guangyun Li A Slowly Varying Spoofing Algorithm Avoiding Tightly-Coupled GNSS/IMU With Multiple Anti-Spoofing Techniques. Search on Bibsonomy IEEE Trans. Veh. Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Ali Javed, Khalid Mahmood Malik, Hafiz Malik, Aun Irtaza Voice spoofing detector: A unified anti-spoofing framework. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Lianxiao Meng, Lin Yang, Wu Yang 0001, Long Zhang 0004 A Survey of GNSS Spoofing and Anti-Spoofing Technology. Search on Bibsonomy Remote. Sens. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Long Huang, Zukun Lu, Chao Ren, Zhe Liu, Zhibin Xiao, Jie Song, Baiyu Li Research on Detection Technology of Spoofing under the Mixed Narrowband and Spoofing Interference. Search on Bibsonomy Remote. Sens. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Mihir Mehta, Kajal Patel Experimental Study of Location Spoofing and Identity Spoofing Attack in Internet of Things Network. Search on Bibsonomy Int. J. Intell. Inf. Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Shanaka Anuradha Samarakoon Bypassing Content-based internet packages with an SSL/TLS Tunnel, SNI Spoofing, and DNS spoofing. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Yangjun Gao, Guangyun Li A Slowly Varying Spoofing Algorithm on Loosely Coupled GNSS/IMU Avoiding Multiple Anti-Spoofing Techniques. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 2381 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license