Cargando…
Spoofing Attack Results Determination in Code Domain Using a Spoofing Process Equation
When a user receiver is tracking an authentic signal, a spoofing signal can be transmitted to the user antenna. The question is under what conditions does the tracking point of the receiver move from the authentic signal to the spoofing signal? In this study, we develop a spoofing process equation (...
Autores principales: | Shin, Beomju, Park, Minhuck, Jeon, Sanghoon, So, Hyoungmin, Kim, Gapjin, Kee, Changdon |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6359678/ https://www.ncbi.nlm.nih.gov/pubmed/30642086 http://dx.doi.org/10.3390/s19020293 |
Ejemplares similares
-
Handbook of biometric anti-spoofing: presentation attack detection
por: Marcel, Sébastien, et al.
Publicado: (2019) -
Dynamic Selection Techniques for Detecting GPS Spoofing Attacks on UAVs
por: Talaei Khoei, Tala, et al.
Publicado: (2022) -
Spoofing Attacks on FMCW Radars with Low-Cost Backscatter Tags
por: Lazaro, Antonio, et al.
Publicado: (2022) -
Datasets of RT spoofing attacks on MIL-STD-1553 communication traffic
por: Yahalom, Ran, et al.
Publicado: (2019) -
Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal
por: Gluck, Tomer, et al.
Publicado: (2020)