Spoofing attack

Known as: Email forging, GPS spoofing, Spoof attack 
In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
The vulnerability of face recognition systems to presentation attacks (also known as direct attacks or spoof attacks) has… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
Highly Cited
2013
Highly Cited
2013
The face recognition community has finally started paying more attention to the long-neglected problem of spoofing attacks. The… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Voice conversion techniques present a threat to speaker verification systems. To enhance the security of speaker verification… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Results from Global Positioning System (GPS) spoofing tests against Phasor Measurement Units (PMUs) are presented, demonstrating… (More)
Is this relevant?
Highly Cited
2012
Highly Cited
2012
User authentication is an important step to protect information and in this field face biometrics is advantageous. Face… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Multimodal biometric systems are commonly believed to be more robust to spoofing attacks than unimodal systems, as they combine… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Spoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems to… (More)
  • table 1
  • table 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. Although the… (More)
  • figure 1
  • figure 2
  • table I
  • figure 4
  • figure 3
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Introduction Biometric devices have been suggested for use in applications from access to personal computers, automated teller… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the… (More)
  • figure 1
  • figure 2
Is this relevant?