-
Hi,
I'm unable to find the paper "Adversarial Attacks on Spoofing Countermeasures of automatic speaker verification". Is it supposed to be on arXiv?
Second question, do you have a more detailed …
-
![kali-castegories](https://user-images.githubusercontent.com/53346722/78282728-5d999a80-74e2-11ea-933d-be8ea15b3d7d.png)
- [ ] `kali-database-assessment-trans`
- [ ] `kali-exploitation-tools-tran…
-
I am working on face anti-spoofing attack recently. I have tried lots of methods, including LBP, HOG + SVM, CNN and so on. However, I found that the models trained on casia dataset and replay attack d…
-
Hey there
If the creation of the HUID is decentralised, what stops an attacker from enrolling fake HUIDs?
Presumably, there is some soft/hardware that takes retinal scans / some other input and…
rdrey updated
7 years ago
-
## What is the proposed Cheat Sheet about?
This drone security Cheat Sheet aims to ensure the safe and secure operation of unmanned aerial vehicles (UAVs) in various mobile, web and cloud appli…
-
Could this vulnerability be a concern?
[https://nvd.nist.gov/vuln/detail/CVE-2018-25031](url)
-
I have an error on line 30
Can u help me please
-
The specification is given:
> A proofHash can be generated by prepending the submitted data..…
This leaves the prepending of data optional. Instead this should be required:
> A proofHash is g…
-
**Describe the bug**
Setup:
- realm EXAMPLE.COM
- good host good.example.com with service principal `HTTP/good.example.com@EXAMPLE.COM`
- evil host (or, realistically, once good but now compromise…
-
when will ovh internal ddos attacks be fixed ? its way to easy to buy ovh servers from resellers for $5 and use them to attack other ovh bypassing the pre firewall and any mitigation and clogging the …