Academic literature on the topic 'Automatic countermeasures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Automatic countermeasures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Automatic countermeasures"
Bayrak, Ali Galip, Francesco Regazzoni, David Novo, Philip Brisk, Francois-Xavier Standaert, and Paolo Ienne. "Automatic Application of Power Analysis Countermeasures." IEEE Transactions on Computers 64, no. 2 (February 2015): 329–41. http://dx.doi.org/10.1109/tc.2013.219.
Full textWojtal, Remigiusz M., and Laurence R. Rilett. "Development of a statistically-based methodology for analyzing automatic safety treatments at isolated high-speed signalized intersections." Archives of Transport 44, no. 4 (November 30, 2017): 75–88. http://dx.doi.org/10.5604/01.3001.0010.6163.
Full textWang, Fang, and Wei Zhang. "OTU Plate Heat Countermeasures of Automatic Test Platform Design." Advanced Materials Research 740 (August 2013): 676–79. http://dx.doi.org/10.4028/www.scientific.net/amr.740.676.
Full textHu, Shengshan, Xingcan Shang, Zhan Qin, Minghui Li, Qian Wang, and Cong Wang. "Adversarial Examples for Automatic Speech Recognition: Attacks and Countermeasures." IEEE Communications Magazine 57, no. 10 (October 2019): 120–26. http://dx.doi.org/10.1109/mcom.2019.1900006.
Full textWu, Zhizheng, Junichi Yamagishi, Tomi Kinnunen, Cemal Hanilci, Mohammed Sahidullah, Aleksandr Sizov, Nicholas Evans, Massimiliano Todisco, and Hector Delgado. "ASVspoof: The Automatic Speaker Verification Spoofing and Countermeasures Challenge." IEEE Journal of Selected Topics in Signal Processing 11, no. 4 (June 2017): 588–604. http://dx.doi.org/10.1109/jstsp.2017.2671435.
Full textKinnunen, Tomi, Hector Delgado, Nicholas Evans, Kong Aik Lee, Ville Vestman, Andreas Nautsch, Massimiliano Todisco, et al. "Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals." IEEE/ACM Transactions on Audio, Speech, and Language Processing 28 (2020): 2195–210. http://dx.doi.org/10.1109/taslp.2020.3009494.
Full textYamagishi, Junichi, Tomi H. Kinnunen, Nicholas Evans, Phillip De Leon, and Isabel Trancoso. "Introduction to the Issue on Spoofing and Countermeasures for Automatic Speaker Verification." IEEE Journal of Selected Topics in Signal Processing 11, no. 4 (June 2017): 585–87. http://dx.doi.org/10.1109/jstsp.2017.2698143.
Full textAltuwayjiri, Sarah Mohammed, Ouiem Bchir, and Mohamed Maher Ben Ismail. "Generalized Replay Spoofing Countermeasure Based on Combining Local Subclassification Models." Applied Sciences 12, no. 22 (November 18, 2022): 11742. http://dx.doi.org/10.3390/app122211742.
Full textYou Yu, Huang. "Research on Psychological Problems and Countermeasures of Contemporary College Students Based on Data Analysis." Mobile Information Systems 2022 (February 23, 2022): 1–7. http://dx.doi.org/10.1155/2022/3366837.
Full textAlam. "On the Use of Fisher Vector Encoding for Voice Spoofing Detection." Proceedings 31, no. 1 (November 20, 2019): 37. http://dx.doi.org/10.3390/proceedings2019031037.
Full textDissertations / Theses on the topic "Automatic countermeasures"
Neubauer, Catherine. "Alertness Maintaining Tasks: A Fatigue Countermeasure During Vehicle Automation?" University of Cincinnati / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1396522991.
Full textFältros, Jesper, Isak Alinger, and Bergen Axel von. "Safety risks with ZigBee smart devices : Identifying risks and countermeasures in ZigBee devices with an eavesdropping experiment." Thesis, Tekniska Högskolan, Jönköping University, JTH, Datateknik och informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-49630.
Full textVeshchikov, Nikita. "Use of simulators for side-channel analysis: Leakage detection and analysis of cryptographic systems in early stages of development." Doctoral thesis, Universite Libre de Bruxelles, 2008. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/256648.
Full textOption Informatique du Doctorat en Sciences
info:eu-repo/semantics/nonPublished
Veshchikov, Nikita. "Use of simulators for side-channel analysis: Leakage detection and analysis of cryptographic systems in early stages of development." Doctoral thesis, Universite Libre de Bruxelles, 2017. https://dipot.ulb.ac.be/dspace/bitstream/2013/256648/3/final.pdf.
Full textOption Informatique du Doctorat en Sciences
info:eu-repo/semantics/nonPublished
Valičková, Monika. "Řízení bezpečnosti inteligentní domácnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378362.
Full textShelton, Madura Anushanga. "Towards Automatic Power Analysis Leakage Elimination." Thesis, 2022. https://hdl.handle.net/2440/136025.
Full textThesis (Ph.D.) -- University of Adelaide, School of Computer Science, 2022
Ali, Bako. "Internet of Things based Smart Homes : Security Risk Assessment and Recommendations." Thesis, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-58806.
Full textValiderat; 20160620 (global_studentproject_submitter)
Books on the topic "Automatic countermeasures"
Wassim, Najm, and John A. Volpe National Transportation Systems Center (U.S.), eds. Synthesis report: Examination of target vehicular crashes and potential ITS countermeasures. [Washington, D.C.]: National Highway Traffic Safety Administration, 1995.
Find full textNeudert, Lisa-Maria N. Germany. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190931407.003.0008.
Full textBook chapters on the topic "Automatic countermeasures"
Belleville, Nicolas, Karine Heydemann, Damien Couroussé, Thierno Barry, Bruno Robisson, Abderrahmane Seriai, and Henri-Pierre Charles. "Automatic Application of Software Countermeasures Against Physical Attacks." In Cyber-Physical Systems Security, 135–55. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98935-8_7.
Full textBreier, Jakub, and Xiaolu Hou. "Automated Deployment of Software Encoding Countermeasure." In Automated Methods in Cryptographic Fault Analysis, 173–94. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11333-9_7.
Full textBayrak, Ali Galip, Francesco Regazzoni, David Novo, and Paolo Ienne. "Sleuth: Automated Verification of Software Power Analysis Countermeasures." In Cryptographic Hardware and Embedded Systems - CHES 2013, 293–310. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40349-1_17.
Full textSchmidt, Henrik, and Joseph R. Edwards. "Goats: Multi-Platform Sonar Concept for Coastal Mine Countermeasures." In Multi-Robot Systems: From Swarms to Intelligent Automata, 133–40. Dordrecht: Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-017-2376-3_14.
Full textRegan, Michael A., and Oscar Oviedo-Trespalacios. "Driver Distraction: Mechanisms, Evidence, Prevention, and Mitigation." In The Vision Zero Handbook, 1–62. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-23176-7_38-1.
Full textRegan, Michael A., and Oscar Oviedo-Trespalacios. "Driver Distraction: Mechanisms, Evidence, Prevention, and Mitigation." In The Vision Zero Handbook, 995–1056. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-76505-7_38.
Full textKarmakar, Sandip, and Dipanwita Roy Chowdhury. "Countermeasures of Side Channel Attacks on Symmetric Key Ciphers Using Cellular Automata." In Lecture Notes in Computer Science, 623–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33350-7_64.
Full textZhong, Xiao Feng, De Chang Liu, Ping Luo, and Hai Yi Zhou. "Fault Diagnosis and Countermeasure for the Pantograph Automatic Lowering Under the Condition of Dual-Locomotive Running." In Lecture Notes in Electrical Engineering, 429–35. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7989-4_43.
Full textNguyen, Hai Thanh, Katrin Franke, and Slobodan Petrovic. "Feature Extraction Methods for Intrusion Detection Systems." In Threats, Countermeasures, and Advances in Applied Information Security, 23–52. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0978-5.ch002.
Full textAl-Saadoon, Ghossoon M. Waleed. "Automatic Intrusion Detection and Secret Multi Agent Preservation Using Authentication Measurement Network Threat." In Handbook of Research on Threat Detection and Countermeasures in Network Security, 33–47. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6583-5.ch003.
Full textConference papers on the topic "Automatic countermeasures"
Sere, Ahmadou A., Julien Iguchi-Cartigny, and Jean-Louis Lanet. "Automatic detection of fault attack and countermeasures." In the 4th Workshop. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1631716.1631723.
Full textEvans, Nicholas, Tomi Kinnunen, and Junichi Yamagishi. "Spoofing and countermeasures for automatic speaker verification." In Interspeech 2013. ISCA: ISCA, 2013. http://dx.doi.org/10.21437/interspeech.2013-288.
Full textAlluri, K. N. R. K. Raju, and Anil Kumar Vuppala. "IIIT-H Spoofing Countermeasures for Automatic Speaker Verification Spoofing and Countermeasures Challenge 2019." In Interspeech 2019. ISCA: ISCA, 2019. http://dx.doi.org/10.21437/interspeech.2019-1623.
Full textLiu, Songxiang, Haibin Wu, Hung-Yi Lee, and Helen Meng. "Adversarial Attacks on Spoofing Countermeasures of Automatic Speaker Verification." In 2019 IEEE Automatic Speech Recognition and Understanding Workshop (ASRU). IEEE, 2019. http://dx.doi.org/10.1109/asru46091.2019.9003763.
Full textAlegre, Federico, Asmaa Amehraye, and Nicholas Evans. "Spoofing countermeasures to protect automatic speaker verification from voice conversion." In ICASSP 2013 - 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2013. http://dx.doi.org/10.1109/icassp.2013.6638222.
Full textBayrak, Ali Galip, Francesco Regazzoni, Philip Brisk, François-Xavier Standaert, and Paolo Ienne. "A first step towards automatic application of power analysis countermeasures." In the 48th Design Automation Conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2024724.2024778.
Full textWu, Zhizheng, Tomi Kinnunen, Nicholas Evans, Junichi Yamagishi, Cemal Hanilçi, Md Sahidullah, and Aleksandr Sizov. "ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge." In Interspeech 2015. ISCA: ISCA, 2015. http://dx.doi.org/10.21437/interspeech.2015-462.
Full textBhukya, Ramesh K., and Aditya Raj. "Automatic Speaker Verification Spoof Detection and Countermeasures Using Gaussian Mixture Model." In 2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON). IEEE, 2022. http://dx.doi.org/10.1109/upcon56432.2022.9986418.
Full textSahidullah, Md, Héctor Delgado, Massimiliano Todisco, Hong Yu, Tomi Kinnunen, Nicholas Evans, and Zheng-Hua Tan. "Integrated Spoofing Countermeasures and Automatic Speaker Verification: An Evaluation on ASVspoof 2015." In Interspeech 2016. ISCA, 2016. http://dx.doi.org/10.21437/interspeech.2016-1280.
Full textKang, Woo Hyun, Jahangir Alam, and Abderrahim Fathan. "CRIM's System Description for the ASVSpoof2021 Challenge." In 2021 Edition of the Automatic Speaker Verification and Spoofing Countermeasures Challenge. ISCA: ISCA, 2021. http://dx.doi.org/10.21437/asvspoof.2021-16.
Full textReports on the topic "Automatic countermeasures"
Hu, Xiaoqiang, Jieyi Bao, Yi Jiang, and Shuo Li. Highway Lighting Test Bed on INDOT Facility (Off-Roadway). Purdue University, 2022. http://dx.doi.org/10.5703/1288284317384.
Full text