Analysis methods of secretive labeling voice commands for remote voice control to confirm their authenticity

In connection with the gradual transfer of spheres of human activity in the information field, every day there is a growth of threats associated with their information security. The result of this process leads to a technological race between the development of information security and the developme...

Full description

Bibliographic Details
Main Author: Nikita Sergeevich Dvoryankin
Format: Article
Language:English
Published: Moscow Engineering Physics Institute 2017-04-01
Series:Bezopasnostʹ Informacionnyh Tehnologij
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/51