Spoofing attack

Results: 127



#Item
1ASVspoof 2015: the First Automatic Speaker Verification Spoofing and Countermeasures Challenge Zhizheng Wu1 Tomi Kinnunen2 Nicholas Evans3 Junichi Yamagishi1

ASVspoof 2015: the First Automatic Speaker Verification Spoofing and Countermeasures Challenge Zhizheng Wu1 Tomi Kinnunen2 Nicholas Evans3 Junichi Yamagishi1

Add to Reading List

Source URL: www.cstr.inf.ed.ac.uk

Language: English - Date: 2015-09-29 11:06:25
22015 IEEE Symposium on Security and Privacy  Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, †

2015 IEEE Symposium on Security and Privacy Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, †

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:08
3Protecting Wireless Networks from Identity Theft (Spoofing) using the spatial correlation of received signal strength. GudipudiChandanaTheja MTech Student Dapartment of Computer Science Engineering ST.Mary’s Gr oup of

Protecting Wireless Networks from Identity Theft (Spoofing) using the spatial correlation of received signal strength. GudipudiChandanaTheja MTech Student Dapartment of Computer Science Engineering ST.Mary’s Gr oup of

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-13 08:43:06
4University of Amsterdam System & Network Engineering RP1 Defending against DNS reflection amplification attacks February 14, 2013

University of Amsterdam System & Network Engineering RP1 Defending against DNS reflection amplification attacks February 14, 2013

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2013-02-14 04:49:27
515. SCPNT_Coop Authentication_Gao_2014.pptx

15. SCPNT_Coop Authentication_Gao_2014.pptx

Add to Reading List

Source URL: scpnt.stanford.edu

Language: English - Date: 2014-11-10 19:11:29
6Human vs Machine Spoofing Detection on Wideband and Narrowband Data Mirjam Wester1 , Zhizheng Wu1 , Junichi Yamagishi1,2 1 The Centre for Speech Technology Research, The University of Edinburgh, UK 2

Human vs Machine Spoofing Detection on Wideband and Narrowband Data Mirjam Wester1 , Zhizheng Wu1 , Junichi Yamagishi1,2 1 The Centre for Speech Technology Research, The University of Edinburgh, UK 2

Add to Reading List

Source URL: www.cstr.ed.ac.uk

Language: English - Date: 2015-09-29 11:06:25
7Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents Yang Liu1 , Armin Sarabi1 , Jing Zhang1 , Parinaz Naghizadeh1 Manish Karir2 , Michael Bailey3 , Mingyan Liu1,2 1 EECS Department, University of Michiga

Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents Yang Liu1 , Armin Sarabi1 , Jing Zhang1 , Parinaz Naghizadeh1 Manish Karir2 , Michael Bailey3 , Mingyan Liu1,2 1 EECS Department, University of Michiga

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2015-08-05 18:31:26
8Efficient Content Verification in Named Data Networking Dohyung Kim Sunwook Nam  Sungkyunkwan University

Efficient Content Verification in Named Data Networking Dohyung Kim Sunwook Nam Sungkyunkwan University

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:11:48
9Can Gait Biometrics be Spoofed?∗ A. Hadid, M. Ghahramani, V. Kellokumpu, M. Pietik¨ainen Center for Machine Vision Research, University of Oulu, Finland J. Bustard & M. Nixon School of Electronics and Computer Science

Can Gait Biometrics be Spoofed?∗ A. Hadid, M. Ghahramani, V. Kellokumpu, M. Pietik¨ainen Center for Machine Vision Research, University of Oulu, Finland J. Bustard & M. Nixon School of Electronics and Computer Science

Add to Reading List

Source URL: www.ee.oulu.fi

Language: English - Date: 2012-04-06 05:12:29
10Fragmentation Considered Poisonous  arXiv:1205.4011v1 [cs.CR] 17 May 2012 Amir Herzberg† and Haya Shulman‡ Dept. of Computer Science, Bar Ilan University

Fragmentation Considered Poisonous arXiv:1205.4011v1 [cs.CR] 17 May 2012 Amir Herzberg† and Haya Shulman‡ Dept. of Computer Science, Bar Ilan University

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2012-05-23 11:56:51