Login / Signup
Distinguishing Attack on Bivium.
Zainab Noferesti
Neda Rohani
Javad Mohajeri
Mohammad Reza Aref
Published in:
CIT (2010)
Keyphrases
</>
malicious attacks
countermeasures
attack detection
ddos attacks
detection mechanism
malicious users
real time
information retrieval
genetic algorithm
multiscale
computer systems
multistage
secret key
cyber attacks
attack graph
key exchange protocol