Intermediate spoofing strategies and countermeasures | TUP Journals & Magazine | IEEE Xplore