Login / Signup
Defending against the attack of the micro-clones.
Rijnard van Tonder
Claire Le Goues
Published in:
ICPC (2016)
Keyphrases
</>
ddos attacks
software systems
dos attacks
denial of service attacks
artificial intelligence
malicious users
databases
high level
countermeasures
database
data mining
source code
secret key
power analysis
attack detection