Attaque par usurpation d'identité (French Wikipedia)

Analysis of information sources in references of the Wikipedia article "Attaque par usurpation d'identité" in French language version.

refsWebsite
Global rank French rank
2nd place
3rd place
1st place
1st place
652nd place
741st place
9th place
19th place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
8,888th place
7,406th place
791st place
1,994th place
low place
low place
332nd place
685th place
low place
low place
low place
low place
194th place
17th place
87th place
20th place
243rd place
21st place
916th place
994th place
7,593rd place
low place
20th place
72nd place
571st place
425th place
low place
low place
low place
low place
274th place
223rd place

archive.is

barracuda.com

bbc.com

blockyourid.com

cornell.edu

web.mae.cornell.edu

  • T.E. Humphreys, B. M. Ledvina, M. Psiaki et B. W. O'Hanlon, « Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer », Ion GNSS,‎ (lire en ligne, consulté le ).

csmonitor.com

  • Scott Peterson et Payam Faramarzi, « Exclusive: Iran hijacked US drone, says Iranian engineer », Christian Science Monitor,‎ (lire en ligne).

doi.org

dx.doi.org

  • K. Jindal, S. Dalal et K. K. Sharma, « Analyzing Spoofing Attacks in Wireless Networks », 2014 Fourth International Conference on Advanced Computing Communication Technologies,‎ , p. 398–402 (ISBN 978-1-4799-4910-6, DOI 10.1109/ACCT.2014.46, lire en ligne).
  • N. Carson, Martin, S., Starling, J. et Bevly, D. « GPS spoofing detection and mitigation using Cooperative Adaptive Cruise Control system » () (DOI 10.1109/IVS.2016.7535525)
    2016 IEEE Intelligent Vehicles Symposium (IV), 2016-
    .
  • (en) Vadim Shchemelinin, Mariia Topchina et Konstantin Simonchik, « Vulnerability of Voice Verification Systems to Spoofing Attacks by TTS Voices Based on Automatically Labeled Telephone Speech », Speech and Computer, Cham, Springer International Publishing, lecture Notes in Computer Science, vol. 8773,‎ , p. 475–481 (ISBN 978-3-319-11581-8, DOI 10.1007/978-3-319-11581-8_59, lire en ligne).
  • Aleksandr M. Sinitca, Nikita V. Efimchik, Evgeniy D. Shalugin et Vladimir A. Toropov, « Voice Antispoofing System Vulnerabilities Research », 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), St. Petersburg and Moscow, Russia, IEEE,‎ , p. 505–508 (ISBN 978-1-7281-5761-0, DOI 10.1109/EIConRus49466.2020.9039393, lire en ligne).

finextra.com

flushdraw.net

globalwebindex.com

blog.globalwebindex.com

googleusercontent.com

webcache.googleusercontent.com

homelandsecurity.org

ieee.org

ieeexplore.ieee.org

  • K. Jindal, S. Dalal et K. K. Sharma, « Analyzing Spoofing Attacks in Wireless Networks », 2014 Fourth International Conference on Advanced Computing Communication Technologies,‎ , p. 398–402 (ISBN 978-1-4799-4910-6, DOI 10.1109/ACCT.2014.46, lire en ligne).
  • Aleksandr M. Sinitca, Nikita V. Efimchik, Evgeniy D. Shalugin et Vladimir A. Toropov, « Voice Antispoofing System Vulnerabilities Research », 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), St. Petersburg and Moscow, Russia, IEEE,‎ , p. 505–508 (ISBN 978-1-7281-5761-0, DOI 10.1109/EIConRus49466.2020.9039393, lire en ligne).

maritime-executive.com

  • Dana A. Goward, « Mass GPS Spoofing Attack in Black Sea? », The Maritime Executive, (consulté le ) : « An apparent mass and blatant, GPS spoofing attack involving over 20 vessels in the Black Sea last month has navigation experts and maritime executives scratching their heads ».

mitre.org

schneier.com

  • Bruce Schneier, « Caller ID Spoofing », schneier.com, (consulté le ).

scmagazine.com.au

springer.com

link.springer.com

  • (en) Vadim Shchemelinin, Mariia Topchina et Konstantin Simonchik, « Vulnerability of Voice Verification Systems to Spoofing Attacks by TTS Voices Based on Automatically Labeled Telephone Speech », Speech and Computer, Cham, Springer International Publishing, lecture Notes in Computer Science, vol. 8773,‎ , p. 475–481 (ISBN 978-3-319-11581-8, DOI 10.1007/978-3-319-11581-8_59, lire en ligne).

threatpost.com

timesofisrael.com

uscert.gov

icscert.uscert.gov

utexas.edu

web.archive.org

wikiwix.com

archive.wikiwix.com

youtube.com