Drive-By Download Attacks: A Comparative Study.
Aditya K. SoodSherali ZeadallyPublished in: IT Prof. (2016)
Keyphrases
- countermeasures
- comparative study
- malicious attacks
- computer security
- attack detection
- terrorist attacks
- security threats
- malicious users
- security protocols
- image watermarking
- watermarking scheme
- traffic analysis
- denial of service attacks
- differential power analysis
- chosen plaintext
- digital image watermarking
- real time
- watermarking algorithm
- anomaly detection
- information systems
- neural network