Login / Signup
Extensive Threat Analysis of Vein Attack Databases and Attack Detection by Fusion of Comparison Scores.
Johannes Schuiki
Michael Linortner
Georg Wimmer
Andreas Uhl
Published in:
CoRR (2022)
Keyphrases
</>
attack detection
databases
real world
data management
countermeasures
rough sets
user preferences
multistage
information security