Login / Signup

Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC.

Julius HekkalaSara NikulaOuti-Marja LatvalaKimmo Halunen
Published in: SECRYPT (2021)
Keyphrases
  • data sets
  • artificial intelligence
  • data mining
  • three dimensional
  • statistical analysis
  • database
  • information retrieval
  • learning algorithm
  • image processing
  • clustering algorithm
  • multi agent
  • artificial neural networks