all InfoSec news
Spoofing Attack Detection in the Physical Layer with Commutative Neural Networks. (arXiv:2211.04269v1 [cs.LG])
Nov. 9, 2022, 2:20 a.m. | Daniel Romero, Peter Gerstoft, Hadi Givehchian, Dinesh Bharadia
cs.CR updates on arXiv.org arxiv.org
In a spoofing attack, an attacker impersonates a legitimate user to access or
tamper with data intended for or produced by the legitimate user. In wireless
communication systems, these attacks may be detected by relying on features of
the channel and transmitter radios. In this context, a popular approach is to
exploit the dependence of the received signal strength (RSS) at multiple
receivers or access points with respect to the spatial location of the
transmitter. Existing schemes rely on long-term …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Security Audit and Compliance Technical Analyst
@ Accenture Federal Services | Washington, DC
ICS Cyber Threat Intelligence Analyst
@ STEMBoard | Arlington, Virginia, United States
Cyber Operations Analyst
@ Peraton | Arlington, VA, United States
Cybersecurity – Information System Security Officer (ISSO)
@ Boeing | USA - Annapolis Junction, MD
Network Security Engineer I - Weekday Afternoons
@ Deepwatch | Remote