Sign in
Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyberspace.
Shui Yu
Song Guo
Ivan Stojmenovic
Published in:
IEEE Trans. Computers (2015)
Keyphrases
</>
countermeasures
malicious attacks
computer security
traffic analysis
terrorist attacks
attack detection
malicious users
security mechanisms
security threats
web pages
watermarking scheme
cyber attacks
security problems
data publishing
watermarking method