z-logo
open-access-imgOpen Access
Analysis methods of secretive labeling voice commands for remote voice control to confirm their authenticity
Author(s) -
Nikita S. Dvoryankin
Publication year - 2017
Publication title -
bezopasnostʹ informacionnyh tehnologij
Language(s) - English
Resource type - Journals
eISSN - 2074-7136
pISSN - 2074-7128
DOI - 10.26583/bit.2017.1.03
Subject(s) - variety (cybernetics) , voice command device , computer science , computer security , field (mathematics) , process (computing) , speaker recognition , information security , telecommunications , access control , control (management) , speech recognition , artificial intelligence , mathematics , pure mathematics , operating system

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here