News
While wireless communication has been implemented for the data exchange in the secondary frequency control of microgrids, the wireless links also open doors to spoofing attacks. Most existing ...
This paper gives a window browsing of the iris technology, its application areas and the spoofing attacks suggested so far from its initiation. Iris recognition and identification algorithms used ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results