Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Spoofing attack

Known as: Email forging, GPS spoofing, Spoof attack 
In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
An increasing number of wireless applications rely on GPS signals for localization, navigation, and time synchronization. However… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Current face biometric systems are vulnerable to spoofing attacks. A spoofing attack occurs when a person tries to masquerade as… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
The flexibility and openness of wireless networks enables an adversary to masquerade as other devices easily. Identity-based… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
A portable civilian GPS spoofer is implemented on a digital signal processor and used to characterize spoofing effects and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
MAC addresses can be easily spoofed in 802.11 wireless LANs. An adversary can exploit this vulnerability to launch a large number… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. Although the… Expand
  • figure 1
  • figure 2
  • table I
  • figure 4
  • figure 3
Is this relevant?
Highly Cited
2007
Highly Cited
2007
IP spoofing has often been exploited by Distributed Denial of Service (DDoS) attacks to: 1)conceal flooding sources and dilute… Expand
  • figure 1
  • table I
  • figure 2
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process… Expand
  • figure 1
  • figure 2
  • figure 4
  • table 1
  • table 2
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Biometric devices have been suggested for use in applications from access to personal computers, automated teller machines… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1997
Highly Cited
1997
The paper analyzes a network based denial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN… Expand
  • figure 2
  • table 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?