Login / Signup
Secure system identification.
Mehrdad Showkatbakhsh
Paulo Tabuada
Suhas N. Diggavi
Published in:
Allerton (2016)
Keyphrases
</>
input output
recurrent neural networks
security issues
security requirements
covert channel
authentication scheme
nonlinear dynamics
cryptographic protocols
standard model
security analysis
key management
real time
operating system
artificial intelligence
security level
databases
data sets
data encryption
database