On reliability and security of randomized detectors against sensitivity analysis attacks.
Maha El ChoubassiPierre MoulinPublished in: IEEE Trans. Inf. Forensics Secur. (2009)
Keyphrases
- sensitivity analysis
- security threats
- security problems
- security mechanisms
- computer security
- security measures
- java card
- security protocols
- denial of service attacks
- cyber attacks
- security vulnerabilities
- fault injection
- security flaws
- stream cipher
- managerial insights
- security breaches
- countermeasures
- security issues
- security risks
- influence diagrams
- malicious users
- chosen plaintext
- cryptographic protocols
- malicious attacks
- information security
- access control
- variational inequalities
- buffer overflow
- security policies
- smart card
- network security
- security requirements
- decision variables
- object detection
- key management
- biometric template
- intrusion prevention
- dos attacks
- information leakage
- secure routing
- intrusion detection system
- intrusion detection and prevention
- malicious nodes
- cyber security
- ddos attacks