Login / Signup

Traitor tracing against powerful attacks.

Simon McNicolSerdar BoztasAsha Rao
Published in: ISIT (2005)
Keyphrases
  • countermeasures
  • attack detection
  • databases
  • malicious attacks
  • malicious users
  • neural network
  • high level
  • lightweight
  • intrusion detection
  • security protocols
  • traffic analysis
  • terrorist attacks