Login / Signup
Vectorial fast correlation attacks.
Jovan Dj. Golic
Guglielmo Morgari
Published in:
IACR Cryptol. ePrint Arch. (2004)
Keyphrases
</>
countermeasures
malicious attacks
correlation coefficient
highly correlated
security protocols
terrorist attacks
data sets
learning algorithm
cooperative
intrusion detection
computer security
detect malicious