„Impersonation“
Suchergebnisse
1.000+ Treffer
-
An optimal strategy to countermeasure the impersonation attack in wireless mesh network
-
The Great Impersonation – in large print
-
The Great Impersonation – in large print
-
Mimetic Desires – Impersonation and Guising across South Asia
-
Detection for User Impersonation Attacks in Mobile Social Networks Based on High-order Markov Chains
-
Securing SQL Server – DBAs Defending the Database
-
Dynamic Secrets in Communication Security
-
Constructing identities in institutional impersonation fraud: self-styling and other-styling practices through stances
-
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication
-
Chameleon impersonation of NK cells and ILC1s
-
Vedantam vs. Venus: Drag, Impersonation, and the Limitations of Gender Trouble
-
An improved feature extraction for Hindi language audio impersonation attack detection
-
Glottic impersonation by a laryngeal neoplasm
-
Design and analysis of data link impersonation attack for wired LAN application layer services
-
Domain-based Latent Personal Analysis and its use for impersonation detection in social media
-
The Great Impersonation
-
An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment
-
Introduction to Cyberdeception
-
Denial of Services in MANET - Part A
-
Qui chante? The Lyric’s Voice as Impersonation