Curtain: Keep Your Hosts Away from USB Attacks.
Jianming FuJianwei HuangLanxin ZhangPublished in: ISC (2017)
Keyphrases
- stepping stones
- countermeasures
- smart card
- data transmission
- java card
- mobile agents
- watermarking scheme
- malicious attacks
- security mechanisms
- digital image watermarking
- attack detection
- network traffic
- data sets
- malicious users
- website
- security threats
- traffic analysis
- security protocols
- image watermarking
- storage devices
- watermarking technique
- neural network