Sign in
Data Exfiltration via Multipurpose RFID Cards and Countermeasures.
Zheng Zhou
Weiming Zhang
Nenghai Yu
Published in:
CoRR (2019)
Keyphrases
</>
countermeasures
data sets
data analysis
data collection
computer systems
data acquisition
rfid tags
information systems
data sources
data points
lightweight
data distribution
missing values
databases
information technology
knowledge discovery