Login / Signup
Acoustic Cybersecurity: Exploiting Voice-Activated Systems.
Forrest McKee
David Noever
Published in:
CoRR (2023)
Keyphrases
</>
feature selection
databases
distributed systems
intelligent systems
database
data sets
decision trees
expert systems
management system
building blocks
computing systems
interactive voice response