Skip to search formSkip to main contentSkip to account menu

Spoofing attack

Known as: Email forging, GPS spoofing, Spoof attack 
In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
The problem of global positioning system (GPS) spoofing attacks on smart grids endowed with phasor measurement units (PMUs) is… 
2011
2011
Cloud computing is becoming popular quickly. In cloud computing, people store their important data in the cloud, which makes it… 
2011
2011
In this brief, a terahertz (THz) switch consisting of perfect conductor metamaterials is demonstrated both theoretically and… 
Highly Cited
2010
Highly Cited
2010
Wireless sensor networks are widely used for applications such as environmental monitoring, airport safety, health care, etc. For… 
Highly Cited
2007
2007
2007
We present an architecture designed for alert verification (i.e., to reduce false positives) in network intrusion-detection… 
Highly Cited
2004
Highly Cited
2004
Radio frequency identification (RFID) is expected to become pervasive and ubiquitous, as it can be embedded into everyday items… 
Highly Cited
2003
Highly Cited
2003
In 2000, Hwang and Li proposed a new remote user authentication scheme using smart cards. Chan and Chang showed that the…