Login / Signup
A Look at Trojan Attack, Pruning, and Dependability.
André Ivanov
Published in:
IEEE Des. Test (2015)
Keyphrases
</>
ambient intelligence
search space
pruning method
pruning methods
attack detection
countermeasures
effective pruning
malicious users
pruning algorithms
complex systems
pruning algorithm
malicious attacks
neural network
denial of service attacks
attack graph
intelligent systems
data corruption
data sets