The later pharaohs successfully masqueraded as gods for centuries.
Aristarchos was starting to shiver and sweat, but he continued in a level voice, "He successfully masqueraded as a native of at least a dozen different cultures, probably twice that.
Shi Pei Pu, a male Chinese opera singer, successfully masqueraded as a woman and told Boursicot he was carrying Boursicot's child.
In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.
A few times in my life I have had the pleasure of successfully masquerading as a native.
Shakespeare had been uncommonly optimistic about a woman's chance of successfully masquerading as male, she had decided.
What consternation it would create among the secretive Wreaves to learn that another species could masquerade successfully as one of their own!
A clone, successfully masquerading as the original, undetected for years, was High Society's worst nightmare, an unacceptable affront.
Spoofing of user identity : describes a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.
In the limit the temporary reputation is permanent as C t either approaches zero, or becomes large, and all types successfully masquerade as the dominant strategy type.