|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 302 occurrences of 168 keywords
|
|
|
Results
Found 2381 publication records. Showing 2381 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
143 | Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig |
BASE: an incrementally deployable mechanism for viable IP spoofing prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 20-31, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
BGP anti-spoofing extension, packet marking and filtering, DDoS attack, IP spoofing |
124 | Wei Chen, Dit-Yan Yeung |
Throttling spoofed SYN flooding traffic at the source. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 33(1-3), pp. 47-65, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Hash-based detection, CUSUM, Bloom filter, DDoS, IP spoofing, SYN flooding |
118 | Wei Chen, Dit-Yan Yeung |
Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN/ICONS/MCL ![In: Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 23-29 April 2006, Mauritius, pp. 38, 2006, IEEE Computer Society, 0-7695-2552-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
114 | Toby Ehrenkranz, Jun Li 0001 |
On the state of IP spoofing defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 9(2), pp. 6:1-6:29, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
spoofing defense, spoofing packet, packet filtering, IP spoofing |
113 | Xicheng Lu, Gaofeng Lü, Peidong Zhu, Yijiao Chen |
MASK: An efficient mechanism to extend inter-domain IP spoofing preventions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 51(11), pp. 1745-1760, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IP spoofing prevention, BGP, DDoS |
113 | Fang Qi, Feng Bao 0001, Tieyan Li, Weijia Jia 0001, Yongdong Wu |
Preventing Web-Spoofing with Automatic Detecting Security Indicator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, pp. 112-122, 2006, Springer, 3-540-33052-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Automatic Detecting Security Indicator, SSL, Web Spoofing |
96 | Rolf Oppliger, Sebastian Gajek |
Effective Protection Against Phishing and Web Spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings, pp. 32-41, 2005, Springer, 3-540-28791-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
visual spoofing, phishing, SSL/TLS, Web spoofing |
84 | Yan Shen, Jun Bi, Jianping Wu, Qiang Liu |
The Automatic Peer-to-Peer Signature for Source Address Validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (1) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part I, pp. 855-863, 2007, Springer, 978-3-540-74817-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Source Address Spoofing, Spoofing Prevention, Key Management |
77 | Jihyun Lee, Hyungyu Park, Kyungshik Lim |
Rate-Adaptive TCP Spoofing with Segment Aggregation over Asymmetric Long Delay Links. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking. Towards Ubiquitous Networking and Services, International Conference, ICOIN 2007, Estoril, Portugal, January 23-25, 2007. Revised Selected Papers, pp. 123-132, 2007, Springer, 978-3-540-89523-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Rate-Adaptive TCP Spoofing, Segment Aggregation, Asymmetry Long Delay Link, TCP, PEP |
71 | Yingying Chen 0001, Wade Trappe, Richard P. Martin |
Detecting and Localizing Wireless Spoofing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECON ![In: Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2007, Merged with IEEE International Workshop on Wireless Ad-hoc and Sensor Networks (IWWAN), June 18-21, 2007, San Diego, California, USA, pp. 193-202, 2007, IEEE, 1-4244-1268-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
66 | Zhenhai Duan, Xin Yuan 0001, Jaideep Chandrashekar |
Controlling IP Spoofing through Interdomain Packet Filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 5(1), pp. 22-36, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Infrastructure Protection, Routing Protocols, BGP, DDoS, Network-level security and protection, IP Spoofing |
66 | Asier Martínez, Urko Zurutuza, Roberto Uribeetxeberria, Miguel Fernández, Jesus Lizarraga, Ainhoa Serna, Iñaki Vélez |
Beacon Frame Spoofing Attack Detection in IEEE 802.11 Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 520-525, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
802.11 MAC address spoofing, false positive |
66 | Voravud Santiraveewan, Yongyuth Permpoontanalarp |
A Graph-based Methodology for Analyzing IP Spoofing Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 227-231, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
IP spoofing and Formal Method for Network Security, Network Security, Firewalls |
65 | Roman V. Yampolskiy |
Mimicry Attack on Strategy-Based Behavioral Biometric. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fifth International Conference on Information Technology: New Generations (ITNG 2008), 7-8 April 2008, Las Vegas, Nevada, USA, pp. 916-921, 2008, IEEE Computer Society, 978-0-7695-3099-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Biometric, Behavior, Poker, Spoofing, Mimicry |
64 | Dong Yi, Zhen Lei 0001, Zhiwei Zhang, Stan Z. Li |
Face Anti-spoofing: Multi-spectral Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing ![In: Handbook of Biometric Anti-Spoofing - Trusted Biometrics under Spoofing Attacks, pp. 83-102, 2014, Springer, 978-1-4471-6523-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
64 | John D. Bustard, Mohammad Ghahramani, John N. Carter, Abdenour Hadid, Mark S. Nixon |
Gait Anti-spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing ![In: Handbook of Biometric Anti-Spoofing - Trusted Biometrics under Spoofing Attacks, pp. 147-163, 2014, Springer, 978-1-4471-6523-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
64 | André Anjos, Jukka Komulainen, Sébastien Marcel, Abdenour Hadid, Matti Pietikäinen |
Face Anti-spoofing: Visual Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing ![In: Handbook of Biometric Anti-Spoofing - Trusted Biometrics under Spoofing Attacks, pp. 65-82, 2014, Springer, 978-1-4471-6523-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
64 | Andrew P. Rebera |
Ethical Issues in Anti-spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing ![In: Handbook of Biometric Anti-Spoofing - Trusted Biometrics under Spoofing Attacks, pp. 233-245, 2014, Springer, 978-1-4471-6523-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
64 | Giorgio Fumera, Gian Luca Marcialis, Battista Biggio, Fabio Roli, Stephanie A. C. Schuckers |
Multimodal Anti-spoofing in Biometric Recognition Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing ![In: Handbook of Biometric Anti-Spoofing - Trusted Biometrics under Spoofing Attacks, pp. 165-184, 2014, Springer, 978-1-4471-6523-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
64 | Nicholas W. D. Evans, Tomi Kinnunen, Junichi Yamagishi, Zhizheng Wu 0001, Federico Alegre, Phillip L. De Leon |
Speaker Recognition Anti-spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing ![In: Handbook of Biometric Anti-Spoofing - Trusted Biometrics under Spoofing Attacks, pp. 125-146, 2014, Springer, 978-1-4471-6523-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
64 | Javier Galbally, Julian Fiérrez-Aguilar, Javier Ortega-Garcia, Raffaele Cappelli |
Fingerprint Anti-spoofing in Biometric Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing ![In: Handbook of Biometric Anti-Spoofing - Trusted Biometrics under Spoofing Attacks, pp. 35-64, 2014, Springer, 978-1-4471-6523-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
64 | Zhenan Sun, Tieniu Tan |
Iris Anti-spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing ![In: Handbook of Biometric Anti-Spoofing - Trusted Biometrics under Spoofing Attacks, pp. 103-123, 2014, Springer, 978-1-4471-6523-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
59 | Yan Shen, Jun Bi, Jianping Wu, Qiang Liu |
A two-level source address spoofing prevention based on automatic signature and verification mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco, pp. 392-397, 2008, IEEE Computer Society, 978-1-4244-2702-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
59 | Vivek Ramachandran, Sukumar Nandi |
Detecting ARP Spoofing: An Active Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 239-250, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
59 | José Meseguer 0001, Ralf Sasse, Helen J. Wang, Yi-Min Wang |
A Systematic Approach to Uncover Security Flaws in GUI Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 71-85, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
59 | Fanglu Guo, Tzi-cker Chiueh |
Sequence Number-Based MAC Address Spoof Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers, pp. 309-329, 2005, Springer, 3-540-31778-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Wireless LAN MAC spoof detection, WLAN monitoring and intrusion detection, Sequence number |
54 | Christian Schridde, Matthew Smith 0001, Bernd Freisleben |
TrueIP: prevention of IP spoofing attacks using identity-based cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 128-137, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network security, denial-of-service, signatures, identity-based cryptography, IP spoofing |
54 | Jun Bi, Jianping Wu, Miao Zhang |
Enable a Trustworthy Network by Source Address Spoofing Prevention Routers: A Formal Description. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 681-691, 2006, Springer, 3-540-36850-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Source Address Spoofing, Source Address Validation, Network Security |
54 | Robert Beverly, Arthur W. Berger, Young Hyun, kc claffy |
Understanding the efficacy of deployed internet source address validation filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, Illinois, USA, November 4-6, 2009, pp. 356-369, 2009, ACM, 978-1-60558-771-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ip spoofing, source address validation, filtering |
52 | Christoph Busch 0001 |
Related Standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing ![In: Handbook of Biometric Anti-Spoofing - Trusted Biometrics under Spoofing Attacks, pp. 205-215, 2014, Springer, 978-1-4471-6523-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
52 | Ivana Chingovska, André Anjos, Sébastien Marcel |
Evaluation Methodologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing ![In: Handbook of Biometric Anti-Spoofing - Trusted Biometrics under Spoofing Attacks, pp. 185-204, 2014, Springer, 978-1-4471-6523-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
52 | Nesli Erdogmus, Sébastien Marcel |
Introduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing ![In: Handbook of Biometric Anti-Spoofing - Trusted Biometrics under Spoofing Attacks, pp. 1-11, 2014, Springer, 978-1-4471-6523-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
52 | |
Impact of artificial gummy fingers on fingerprint systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing ![In: Handbook of Biometric Anti-Spoofing - Trusted Biometrics under Spoofing Attacks, 2014, Springer, 978-1-4471-6523-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
52 | Christophe Champod, Marcela Espinoza |
Forgeries of Fingerprints in Forensic Science. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing ![In: Handbook of Biometric Anti-Spoofing - Trusted Biometrics under Spoofing Attacks, pp. 13-34, 2014, Springer, 978-1-4471-6523-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
52 | Els J. Kindt |
Legal Aspects: Biometric Data, Evidence Rules and Trusted Identities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing ![In: Handbook of Biometric Anti-Spoofing - Trusted Biometrics under Spoofing Attacks, pp. 217-231, 2014, Springer, 978-1-4471-6523-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
49 | Mingjiang Ye, Jianping Wu, Miao Zhang |
Experience with SPM in IPv6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (4) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part IV, pp. 833-840, 2007, Springer, 978-3-540-72589-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Source Address Spoofing, Spoofing Prevention, Security |
47 | Jeffrey Horton, Jennifer Seberry |
Covert Distributed Computing Using Java Through Web Spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings, pp. 48-57, 1998, Springer, 3-540-64732-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
47 | Fang Qi, Zhe Tang, Guojun Wang 0001 |
Attacks vs. Countermeasures of SSL Protected Trust Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 1986-1991, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Richa Bansal, Siddharth Tiwari, Divya Bansal |
Non-cryptographic methods of MAC spoof detection in wireless LAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings of the 16th International Conference on Networks, ICON 2008, December 12-14, 2008, held at India Habitat Centre, New Delhi, India, pp. 1-6, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Fan Min 0001, Jun-yan Zhang, Guo-wie Yang |
An IP Traceback Scheme Integrating DPM and PPM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings, pp. 76-85, 2003, Springer, 3-540-20208-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Deterministic Packet Marking, Denial of Service, IP traceback, IP spoofing, Probabilistic Packet Marking |
40 | Javier Hernandez-Ortega, Julian Fiérrez, Aythami Morales, Javier Galbally |
Introduction to Face Presentation Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing, 2nd Ed. ![In: Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, Second Edition, pp. 187-206, 2019, Springer, 978-3-319-92626-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Ivana Chingovska, Amir Mohammadi, André Anjos, Sébastien Marcel |
Evaluation Methodologies for Biometric Presentation Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing, 2nd Ed. ![In: Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, Second Edition, pp. 457-480, 2019, Springer, 978-3-319-92626-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Ruben Tolosana, Rubén Vera-Rodríguez, Julian Fiérrez, Javier Ortega-Garcia |
Presentation Attacks in Signature Biometrics: Types and Introduction to Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing, 2nd Ed. ![In: Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, Second Edition, pp. 439-453, 2019, Springer, 978-3-319-92626-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Christoph Busch 0001 |
Standards for Biometric Presentation Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing, 2nd Ed. ![In: Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, Second Edition, pp. 503-514, 2019, Springer, 978-3-319-92626-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Adam Czajka, Benedict Becker |
Application of Dynamic Features of the Pupil for Iris Presentation Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing, 2nd Ed. ![In: Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, Second Edition, pp. 151-168, 2019, Springer, 978-3-319-92626-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Guillaume Heusch, Sébastien Marcel |
Remote Blood Pulse Analysis for Face Presentation Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing, 2nd Ed. ![In: Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, Second Edition, pp. 267-289, 2019, Springer, 978-3-319-92626-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Jukka Komulainen, Zinelabidine Boulkenafet, Zahid Akhtar |
Review of Face Presentation Attack Detection Competitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing, 2nd Ed. ![In: Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, Second Edition, pp. 291-317, 2019, Springer, 978-3-319-92626-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Md. Sahidullah, Héctor Delgado, Massimiliano Todisco, Tomi Kinnunen, Nicholas W. D. Evans, Junichi Yamagishi, Kong-Aik Lee |
Introduction to Voice Presentation Attack Detection and Recent Advances. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing, 2nd Ed. ![In: Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, Second Edition, pp. 321-361, 2019, Springer, 978-3-319-92626-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Pavel Korshunov, Sébastien Marcel |
A Cross-Database Study of Voice Presentation Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing, 2nd Ed. ![In: Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, Second Edition, pp. 363-389, 2019, Springer, 978-3-319-92626-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Javier Galbally, Julian Fiérrez, Raffaele Cappelli |
An Introduction to Fingerprint Presentation Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing, 2nd Ed. ![In: Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, Second Edition, pp. 3-31, 2019, Springer, 978-3-319-92626-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | David Yambay, Adam Czajka, Kevin W. Bowyer, Mayank Vatsa, Richa Singh 0001, Afzel Noore, Naman Kohli, Daksha Yadav, Stephanie Schuckers |
Review of Iris Presentation Attack Detection Competitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing, 2nd Ed. ![In: Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, Second Edition, pp. 169-183, 2019, Springer, 978-3-319-92626-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | André Anjos, Pedro Tome, Sébastien Marcel |
An Introduction to Vein Presentation Attacks and Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing, 2nd Ed. ![In: Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, Second Edition, pp. 419-438, 2019, Springer, 978-3-319-92626-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Aythami Morales, Julian Fiérrez, Javier Galbally, Marta Gomez-Barrero |
Introduction to Iris Presentation Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing, 2nd Ed. ![In: Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, Second Edition, pp. 135-150, 2019, Springer, 978-3-319-92626-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Kiran B. Raja, Ramachandra Raghavendra, Sushma Venkatesh, Marta Gomez-Barrero, Christian Rathgeb, Christoph Busch 0001 |
A Study of Hand-Crafted and Naturally Learned Features for Fingerprint Presentation Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing, 2nd Ed. ![In: Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, Second Edition, pp. 33-48, 2019, Springer, 978-3-319-92626-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Els J. Kindt |
A Legal Perspective on the Relevance of Biometric Presentation Attack Detection (PAD) for Payment Services Under PSDII and the GDPR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing, 2nd Ed. ![In: Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, Second Edition, pp. 481-501, 2019, Springer, 978-3-319-92626-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Ivan Himawan, Srikanth R. Madikeri, Petr Motlícek, Milos Cernak, Sridha Sridharan, Clinton Fookes |
Voice Presentation Attack Detection Using Convolutional Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing, 2nd Ed. ![In: Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, Second Edition, pp. 391-415, 2019, Springer, 978-3-319-92626-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | David Yambay, Luca Ghiani, Gian Luca Marcialis, Fabio Roli, Stephanie Schuckers |
Review of Fingerprint Presentation Attack Detection Competitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing, 2nd Ed. ![In: Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, Second Edition, pp. 109-131, 2019, Springer, 978-3-319-92626-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Artur Costa-Pazo, Esteban Vázquez-Fernández, José Luis Alba-Castro, Daniel González-Jiménez |
Challenges of Face Presentation Attack Detection in Real Scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing, 2nd Ed. ![In: Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, Second Edition, pp. 247-266, 2019, Springer, 978-3-319-92626-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Si-Qi Liu 0003, Pong C. Yuen, Xiaobai Li, Guoying Zhao 0001 |
Recent Progress on Face Presentation Attack Detection of 3D Mask Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing, 2nd Ed. ![In: Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, Second Edition, pp. 229-246, 2019, Springer, 978-3-319-92626-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Sushil Bhattacharjee, Amir Mohammadi, André Anjos, Sébastien Marcel |
Recent Advances in Face Presentation Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing, 2nd Ed. ![In: Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, Second Edition, pp. 207-228, 2019, Springer, 978-3-319-92626-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Pierluigi Tuveri, Luca Ghiani, Mikel Zurutuza, Valerio Mura, Gian Luca Marcialis |
Interoperability Among Capture Devices for Fingerprint Presentation Attacks Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing, 2nd Ed. ![In: Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, Second Edition, pp. 71-108, 2019, Springer, 978-3-319-92626-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Yaseen Moolla, Luke Nicholas Darlow, Ameeth Sharma, Ann Singh, Johan Van Der Merwe |
Optical Coherence Tomography for Fingerprint Presentation Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Biometric Anti-Spoofing, 2nd Ed. ![In: Handbook of Biometric Anti-Spoofing - Presentation Attack Detection, Second Edition, pp. 49-70, 2019, Springer, 978-3-319-92626-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
37 | Gian Luca Marcialis, Aaron Lewicke, Bozhao Tan, Pietro Coli, Dominic Grimberg, Alberto Congiu, Alessandra Tidu, Fabio Roli, Stephanie A. C. Schuckers |
First International Fingerprint Liveness Detection Competition - LivDet 2009. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIAP ![In: Image Analysis and Processing - ICIAP 2009, 15th International Conference Vietri sul Mare, Italy, September 8-11, 2009, Proceedings, pp. 12-23, 2009, Springer, 978-3-642-04145-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anti-spoofing protection, security, biometrics, Fingerprint, spoofing, liveness detection |
37 | Aniello Castiglione, Roberto De Prisco, Alfredo De Santis |
Do You Trust Your Phone? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies, 10th International Conference, EC-Web 2009, Linz, Austria, September 1-4, 2009. Proceedings, pp. 50-61, 2009, Springer, 978-3-642-03963-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SMS security, mobile malware, telephone phishing, telephone pharming, caller ID spoofing, SMS spoofing, NGN, identity theft, untraceability, VoIP security |
36 | Yong Sheng, Keren Tan, Guanling Chen, David Kotz, Andrew T. Campbell |
Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 1768-1776, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Qing Li 0034, Wade Trappe |
Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 2(4), pp. 793-808, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Viktor Krammer |
Phishing defense against IDN address spoofing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 32, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
usability, web browsers, phishing, internet security, unicode, internationalized domain names |
36 | Anat Bremler-Barr, Hanoch Levy |
Spoofing prevention method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA, pp. 536-547, 2005, IEEE, 0-7803-8968-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Mihui Kim, Kijoon Chae |
A Fast Defense Mechanism Against IP Spoofing Traffic in a NEMO Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Convergence in Broadband and Mobile Networking, International Conference, ICOIN 2005, Jeju Island, Korea, January 31- February 2, 2005, Proceedings, pp. 843-852, 2005, Springer, 3-540-24467-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Leonid M. Tombak, Reihaneh Safavi-Naini |
Authentication Codes That Are r-Fold Secure Against Spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994., pp. 166-169, 1994, ACM, 0-89791-732-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
r-fold security, authentication, cryptography, computer security, authentication codes |
35 | Kashif Ali, Mohammad Zulkernine, Hossam S. Hassanein |
Packet Filtering Based on Source Router Marking and Hop-Count. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 15-18 October 2007, Clontarf Castle, Dublin, Ireland, Proceedings, pp. 1061-1068, 2007, IEEE Computer Society, 0-7695-3000-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Hyuncheol Kim, Seong-Jin Ahn 0001, Jun Kyun Choi |
Performance Analysis of Dynamic Host Isolation System in Wireless Mobile Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (5) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part V, pp. 829-838, 2006, Springer, 3-540-34079-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Amir Herzberg, Ahmad Jbara |
Security and identification indicators for browsers against spoofing and phishing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 8(4), pp. 16:1-16:36, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Human-computer interaction, phishing, secure usability, Web spoofing |
31 | Lizhong Xie, Jun Bi, Jianping Wu |
An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (4) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part IV, pp. 801-808, 2007, Springer, 978-3-540-72589-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Source Address Spoofing, Edge Network, IPv6 |
31 | Anat Bremler-Barr, Hanoch Levy |
Brief announcement: spoofing prevention method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, PODC 2004, St. John's, Newfoundland, Canada, July 25-28, 2004, pp. 375, 2004, ACM, 1-58113-802-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
source IP spoofing, distributed denial of service |
30 | Ruishan Zhang, Xinyuan Wang 0005, Ryan Farley, Xiaohui Yang, Xuxian Jiang |
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 61-69, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
DNS spoofing, MITM attacks, SIP, VoIP security |
30 | Dingyi Pei |
New Family of Non-Cartesian Perfect Authentication Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCC ![In: Coding and Cryptology, Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings, pp. 188-201, 2009, Springer, 978-3-642-01813-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
perfect authentication codes, subfield rational normal curves, partially balanced designs, spoofing attacks |
30 | Tae Hwan Kim, Dong Seong Kim 0001, Sang Min Lee 0012, Jong Sou Park |
Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 290-300, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Traffic visualization, Weighted moving average, Intrusion detection, Distributed Denial of Service attacks, Traffic matrix, IP spoofing |
30 | Keisuke Takemori, Masahiko Fujinaga, Toshiya Sayama, Masakatsu Nishigaki |
Host-based traceback; tracking bot and C&C server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009, pp. 400-405, 2009, ACM, 978-1-60558-405-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
DNS reflection attack, host-based traceback, botnet, IP spoofing |
30 | Suman Jana, Sneha Kumar Kasera |
On fast and accurate detection of unauthorized wireless access points using clock skews. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, MOBICOM 2008, San Francisco, California, USA, September 14-19, 2008, pp. 104-115, 2008, ACM, 978-1-60558-096-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
MAC address spoofing, fake access point, IEEE 802.11, fingerprint, timestamp |
30 | Haining Wang, Cheng Jin, Kang G. Shin |
Defense against spoofed IP traffic using hop-count filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 15(1), pp. 40-53, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
host-based, DDoS attacks, IP spoofing, hop-count |
30 | Marwan Abi-Antoun, Daniel Wang, Peter Torr |
Checking threat modeling data flow diagrams for implementation conformance and security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), November 5-9, 2007, Atlanta, Georgia, USA, pp. 393-396, 2007, ACM, 978-1-59593-882-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
reflexion models, denial of service, security analysis, threat modeling, data flow diagrams, information disclosure, tampering, spoofing |
30 | Birger Tödtmann, Erwin P. Rathgeb |
Anticipatory Distributed Packet Filter Configuration for Carrier-Grade IP-Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2006 - Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, 5th International IFIP-TC6 Networking Conference, Coimbra, Portugal, May 15-19, 2006, Proceedings, pp. 928-941, 2006, Springer, 3-540-34192-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Network Security, Packet Filters, IP Spoofing, Critical Infrastructure Protection |
30 | Changho Choi, Yingfei Dong, Zhi-Li Zhang |
LIPS: Lightweight Internet Permit System for Stopping Unwanted Packets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2005: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005, Proceedings, pp. 178-190, 2005, Springer, 3-540-25809-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Unwanted Packets, Network Security, Denial of Service, IP Spoofing |
30 | Min-Hui Lin 0001, Chin-Chen Chang 0001 |
A secure one-time password authentication scheme with low-computation for mobile communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(2), pp. 76-84, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
off-line dictionary attack, server spoofing attack, authentication, smart card, replay attack, one-time password |
24 | Shen Wang 0008, Mahshid Delavar, Muhammad Ajmal Azad, Farshad Nabizadeh, Steve Smith, Feng Hao 0001 |
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Priv. Secur. ![In: ACM Trans. Priv. Secur. 27(1), pp. 1:1-1:25, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
24 | Ji Hyuk Jung, Miyeon Hong, Hyeongjun Choi, Ji Won Yoon |
An Analysis of GPS Spoofing Attack and Efficient Approach to Spoofing Detection in PX4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 46668-46677, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
24 | Bin Zhang, Xiangyu Zhu, Xiaoyu Zhang 0002, Zhen Lei 0001 |
Modeling Spoof Noise by De-spoofing Diffusion and its Application in Face Anti-spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.08275, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
24 | Zheng Zheng, Qian Wang 0002, Cong Wang |
Spoofing Attacks and Anti-Spoofing Methods for Face Authentication Over Smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Mag. ![In: IEEE Commun. Mag. 61(12), pp. 213-219, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Awais Khan 0007, Khalid Mahmood Malik, James Ryan, Mikul Saravanan |
Battling voice spoofing: a review, comparative analysis, and generalizability evaluation of state-of-the-art voice spoofing counter measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Rev. ![In: Artif. Intell. Rev. 56(S1), pp. 513-566, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Shen Wang 0008, Mahshid Delavar, Muhammad Ajmal Azad, Farshad Nabizadeh, Steve Smith, Feng Hao 0001 |
Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.06198, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Bin Zhang, Xiangyu Zhu, Xiaoyu Zhang 0002, Zhen Lei 0001 |
Modeling Spoof Noise by De-spoofing Diffusion and its Application in Face Anti-spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCB ![In: IEEE International Joint Conference on Biometrics, IJCB 2023, Ljubljana, Slovenia, September 25-28, 2023, pp. 1-10, 2023, IEEE, 979-8-3503-3726-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Hande Isil Akçay, Tolga Girici, Emrah Onat |
Spoofing Detection and Anti-Spoofing Kalman Filter Design for an Accelerometer-Integrated GNSS Receiver. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIU ![In: 31st Signal Processing and Communications Applications Conference, SIU 2023, Istanbul, Turkey, July 5-8, 2023, pp. 1-4, 2023, IEEE, 979-8-3503-4355-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Yangjun Gao, Guangyun Li |
A Slowly Varying Spoofing Algorithm Avoiding Tightly-Coupled GNSS/IMU With Multiple Anti-Spoofing Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 71(8), pp. 8864-8876, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Ali Javed, Khalid Mahmood Malik, Hafiz Malik, Aun Irtaza |
Voice spoofing detector: A unified anti-spoofing framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 198, pp. 116770, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Lianxiao Meng, Lin Yang, Wu Yang 0001, Long Zhang 0004 |
A Survey of GNSS Spoofing and Anti-Spoofing Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 14(19), pp. 4826, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Long Huang, Zukun Lu, Chao Ren, Zhe Liu, Zhibin Xiao, Jie Song, Baiyu Li |
Research on Detection Technology of Spoofing under the Mixed Narrowband and Spoofing Interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 14(10), pp. 2506, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Mihir Mehta, Kajal Patel |
Experimental Study of Location Spoofing and Identity Spoofing Attack in Internet of Things Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Intell. Inf. Technol. ![In: Int. J. Intell. Inf. Technol. 18(3), pp. 1-13, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Shanaka Anuradha Samarakoon |
Bypassing Content-based internet packages with an SSL/TLS Tunnel, SNI Spoofing, and DNS spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.05447, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Yangjun Gao, Guangyun Li |
A Slowly Varying Spoofing Algorithm on Loosely Coupled GNSS/IMU Avoiding Multiple Anti-Spoofing Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(12), pp. 4503, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 2381 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|