Login / Signup
Inversion Attack and Branching.
Jovan Dj. Golic
Andrew J. Clark
Ed Dawson
Published in:
ACISP (1999)
Keyphrases
</>
branch and bound
countermeasures
search tree
image reconstruction
neural network
information systems
objective function
detection mechanism
denial of service attacks
databases
data mining
lower bound
upper bound
secret key
malicious attacks