Login / Signup

Extensive Threat Analysis of Vein Attack Databases and Attack Detection by Fusion of Comparison Scores.

Johannes SchuikiMichael LinortnerGeorg WimmerAndreas Uhl
Published in: CoRR (2022)
Keyphrases
  • attack detection
  • databases
  • real world
  • data management
  • countermeasures
  • rough sets
  • user preferences
  • multistage
  • information security