Login / Signup

On Mitigation of Active Eavesdropping Attack by Spoofing Relay.

Jitendra K. Tugnait
Published in: VTC Spring (2017)
Keyphrases
  • artificial intelligence
  • countermeasures
  • secret key
  • ddos attacks
  • database
  • learning algorithm
  • knowledge base
  • detection mechanism