Login / Signup
Using rootkits hiding techniques to conceal honeypot functionality.
Maryam Mohammadzad
Jaber Karimpour
Published in:
J. Netw. Comput. Appl. (2023)
Keyphrases
</>
neural network
digital watermark
information retrieval
computer vision
image processing
website
digital libraries
probabilistic model