UM

Browse/Search Results:  1-2 of 2 Help

Filters                
Selected(0)Clear Items/Page:    Sort:
Combining two strategies to optimize biometric decisions against spoofing attacks Conference paper
Proceedings of SPIE - The International Society for Optical Engineering, San Diego, CA, AUG 18-20, 2014
Authors:  Li W.;  Poh N.;  Zhou Y.
Favorite  |  View/Download:5/0  |  Submit date:2018/12/21
Biometric Authorization  Biometric Verification  Spoof Attack  
Cyber security and privacy issues in smart grids Journal article
IEEE Communications Surveys and Tutorials, 2012,Volume: 14,Issue: 4,Page: 981
Authors:  Liu J.;  Xiao Y.;  Li S.;  Liang W.;  Chen C.L.P.
View  |  Adobe PDF(1244Kb)  |  Favorite  |  View/Download:786/149  |  Submit date:2018/10/30
Accountability  Ami  Privacy  Scada  Security  Smart Grid