Login / Signup
Another attack on A5/1.
Patrik Ekdahl
Thomas Johansson
Published in:
IEEE Trans. Inf. Theory (2003)
Keyphrases
</>
countermeasures
data sets
genetic algorithm
dos attacks
malicious attacks
abstract argumentation
malicious users
data mining
image processing
decision trees
information security
ddos attacks
denial of service attacks
key exchange protocol