Login / Signup
Traitor tracing against powerful attacks.
Simon McNicol
Serdar Boztas
Asha Rao
Published in:
ISIT (2005)
Keyphrases
</>
countermeasures
attack detection
databases
malicious attacks
malicious users
neural network
high level
lightweight
intrusion detection
security protocols
traffic analysis
terrorist attacks