Spoof

Results: 34



#Item
1

15th Jan, 2018 Caution! Beware of Fraudulent E-mails and Websites. We have currently become aware that somebody is sending fake, phishing and spoof E-mails in the name of JOGMEC (from an email address containing the wor

Add to Reading List

Source URL: www.jogmec.go.jp

- Date: 2018-06-21 05:30:43
    2

    Agatha Crispie By Cenarth Fox The mystery/comedy Agatha Christie spoof

    Add to Reading List

    Source URL: www.foxplays.com

    - Date: 2015-12-06 01:15:01
      3

      Agatha Crispie By Cenarth Fox The mystery/comedy Agatha Christie spoof

      Add to Reading List

      Source URL: www.labyrinth.net.au

      - Date: 2015-12-06 20:37:09
        4Engineering / Global Positioning System / Telecommunications engineering / Electrical engineering / Satellite navigation / Spoof / Automatic gain control

        Microsoft PowerPoint - DMAkos_RFImaterial_SUsyposium2012.pptx

        Add to Reading List

        Source URL: scpnt.stanford.edu

        Language: English - Date: 2012-11-16 03:56:56
        5Security / Prevention / Computer security / Identification / Cryptography / Crime prevention / Information governance / National security / Common Criteria / Biometrics / Protection Profile / Fingerprint

        Biometric Spoof Detection in the Context of Common Criteria Frank Grefrath, German Federal Office for Information Security Nils Tekampe, TÜV Informationstechnik GmbH 11. ICCC, September 2010, Turkey

        Add to Reading List

        Source URL: www.yourcreativesolutions.nl

        Language: English - Date: 2010-08-25 09:46:40
        6Computer network security / Security / Cyberwarfare / Finance / Spoofing attack / Spoofing / Spoof / Computer security / Speech synthesis / Biometrics / Robust random early detection / Speech technology

        ASVspoof 2015: the First Automatic Speaker Verification Spoofing and Countermeasures Challenge Zhizheng Wu1 Tomi Kinnunen2 Nicholas Evans3 Junichi Yamagishi1

        Add to Reading List

        Source URL: www.cstr.inf.ed.ac.uk

        Language: English - Date: 2015-09-29 11:06:25
        7Agatha Christie / Agatha

        Agatha Crispie By Cenarth Fox The mystery/comedy Agatha Christie spoof

        Add to Reading List

        Source URL: www.labyrinth.net.au

        Language: English - Date: 2015-12-06 01:15:01
        8Computer network security / IP address spoofing / Spoofing attack / Wireless security / Wireless LAN / ARP spoofing / MAC address / IEEE 802.11 / Spoof / Computer network / MAC filtering / Computer security

        Protecting Wireless Networks from Identity Theft (Spoofing) using the spatial correlation of received signal strength. GudipudiChandanaTheja MTech Student Dapartment of Computer Science Engineering ST.Mary’s Gr oup of

        Add to Reading List

        Source URL: www.ijmetmr.com

        Language: English - Date: 2015-02-13 08:43:06
        9

        The Directional Attack on Wireless Localization – or – How to Spoof Your Location with a Tin Can Kevin Bauer Damon McCoy

        Add to Reading List

        Source URL: damonmccoy.com

        Language: English - Date: 2015-11-03 22:04:01
          10

          To appear in the Proceedings of the 8th International Conference on Biometrics (ICB), Phuket Thailand Live Face Video vs. Spoof Face Video: Use of Moir´e Patterns to Detect Replay Video Attacks Keyurkumar Patel† , Hu

          Add to Reading List

          Source URL: www.cse.msu.edu

          Language: English - Date: 2012-11-01 12:13:00
            UPDATE