Login / Signup
Macro attacks: What next after Melissa?
Paul Docherty
Peter Simpson
Published in:
Comput. Secur. (1999)
Keyphrases
</>
countermeasures
watermarking algorithm
traffic analysis
malicious attacks
real time
data sets
genetic algorithm
wireless sensor networks
lightweight
security mechanisms
image watermarking
terrorist attacks
malicious users