Marr's Attacks: On Reductionism and Vagueness.
Chris EliasmithCarter KolbeckPublished in: Top. Cogn. Sci. (2015)
Keyphrases
- countermeasures
- fuzzy set theory
- rough set theory
- malicious attacks
- traffic analysis
- fuzzy logic
- expert systems
- watermarking algorithm
- malicious users
- attack detection
- terrorist attacks
- security risks
- security threats
- computer security
- watermarking scheme
- denial of service attacks
- security protocols
- privacy preserving