Login / Signup
The Lotus-Eater Attack
Ian A. Kash
Eric J. Friedman
Joseph Y. Halpern
Published in:
CoRR (2008)
Keyphrases
</>
countermeasures
key exchange protocol
recommender systems
database
real time
security risks
power analysis
information retrieval
decision making
web services
case study
image sequences
ddos attacks
malicious users