Showing 181 - 200 results of 292 for search '"Impostor"', query time: 1.13s Refine Results
  1. 181
    ...“ to be the script for communicating between impostor and victim. We finally find the cause to affect the script...
    Get full text
    Others
  2. 182
    ... (including impostor live and fake fingerprints), the score feature vector is processed using logistic...
    Get full text
    Article
  3. 183
    ..., website impostor, revisões falsas, phishing, filtros-bolha e câmaras de eco. Conclusões: Destaca-se a...
    Get full text
    Article
  4. 184
  5. 185
    by Larcher, Anthony
    Published 2009
    ... allows a relative reduction of 30% in error rate when impostors do not know the client password. We...
    Get full text
  6. 186
    by SHEN, CHIA-YING, 沈家穎
    Published 2018
    ... punishment for the conduct of impostor for application and use of ID card, pay attention to the compatibility...
    Get full text
    Others
  7. 187
    by Christiane N Stachl, Anne M Baranger
    Published 2020-01-01
    ... experience impostor phenomenon. Respondents struggle most with maintaining positive self-perceptions...
    Get full text
    Article
  8. 188
    by Elena MUÑIZ GRIJALVO
    Published 2010-02-01
    .... Del creciente número de rasgos que fueron definiendo al impostor, analizo dos en particular: por una...
    Get full text
    Article
  9. 189
    ..., contenido impostor, contenido manipulado o contenido fabricado) debe ser considerado como un problema social...
    Get full text
    Article
  10. 190
    by Ranjana Koshy, Ausif Mahmood
    Published 2020-10-01
    ... spoofing attacks, where an impostor can impersonate a valid user for authentication. While considerable...
    Get full text
    Article
  11. 191
  12. 192
    by Clarke, Nathan Luke
    Published 2004
    ... are used to illustrate how IAMS would behave, given authorised and impostor authentication attempts...
    Get full text
  13. 193
    by Tecchia, Franco
    Published 2007
    ... in this field introducing a novel form of impostor rendering techniques for animated crowds, and presenting...
    Get full text
  14. 194
    by Zheng, Nan
    Published 2014
    ... whether an authenticating user is the true owner of the smartphone or an impostor who happens to know...
    Get full text
    Get full text
    Others
  15. 195
    by Ding, Hui
    Published 2013
    ... by impostor-based LOD. The third part of the thesis is focused on the novel extended-X3D that we designed...
    Get full text
    Get full text
    Get full text
  16. 196
    by Chao, Yi-Hsiang, 趙怡翔
    Published 2009
    ... hypothesis involves unknown impostors, it is usually difficult to characterize a priori. In this dissertation...
    Get full text
    Others
  17. 197
    by GUSTAVO NUNES WAGNER
    Published 2007
    ... várias abordagens para lidar com esse problema incluindo uma nova estratégia de uso de impostores...
    Get full text
    Get full text
  18. 198
    ... will return a different facial identity to the person located in the ABC system, and the impostor...
    Get full text
    Article
  19. 199
    by Pisani, Paulo Henrique
    Published 2017
    ... for the immune-based classification algorithm Self-Detector, combination of genuine and impostor models...
    Get full text
    Others
  20. 200
    by Paulo Henrique Pisani
    Published 2017
    ... for the immune-based classification algorithm Self-Detector, combination of genuine and impostor models...
    Get full text