Protection of flows under targeted attacks.
Jannik MatuschkeS. Thomas McCormickGianpaolo OrioloBritta PeisMartin SkutellaPublished in: Oper. Res. Lett. (2017)
Keyphrases
- countermeasures
- protection mechanisms
- information security
- biometric template
- watermarking scheme
- malicious attacks
- protection scheme
- security protocols
- security threats
- access control
- protection schemes
- computer security
- security mechanisms
- privacy protection
- security level
- cryptographic protocols
- data protection
- java card
- image watermarking
- data publishing
- denial of service attacks
- terrorist attacks
- spatial domain
- detecting malicious
- social networks