Analysis methods of secretive labeling voice commands for remote voice control to confirm their authenticity
In connection with the gradual transfer of spheres of human activity in the information field, every day there is a growth of threats associated with their information security. The result of this process leads to a technological race between the development of information security and the developme...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Moscow Engineering Physics Institute
2017-04-01
|
Series: | Bezopasnostʹ Informacionnyh Tehnologij |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/51 |