Deceitful Attacks in Security Games.
Thanh Hong NguyenMichael P. WellmanArunesh SinhaPublished in: AAAI Workshops (2018)
Keyphrases
- countermeasures
- neural network
- malicious attacks
- security threats
- watermarking scheme
- computer security
- attack detection
- denial of service attacks
- security flaws
- security protocols
- cryptographic protocols
- digital image watermarking
- traffic analysis
- security risks
- detect malicious
- real time
- differential power analysis
- security problems
- java card
- cyber attacks
- security mechanisms
- information systems