Login / Signup
Watch your Constants: Malicious Streebog.
Riham AlTawy
Amr M. Youssef
Published in:
IACR Cryptol. ePrint Arch. (2014)
Keyphrases
</>
malicious behavior
malicious attacks
malicious users
detect malicious
image processing
database
data sets
databases
social networks
decision trees
three dimensional
high level
database systems
face recognition
relational databases
probabilistic model