Login / Signup
Capturing and Obscuring Ping-Pong Patterns to Mitigate Continuous Attacks.
Kai Wang
Fengkai Yuan
Rui Hou
Zhenzhou Ji
Dan Meng
Published in:
DATE (2020)
Keyphrases
</>
ping pong
real time
data mining techniques
watermarking scheme
information systems
pattern analysis
previously unknown
case study
bayesian networks
digital images
pattern mining
interesting patterns
countermeasures