Login / Signup
Bucket attack on numeric set watermarking model and safeguards.
Gaurav Gupta
Josef Pieprzyk
Len Hamey
Published in:
Inf. Secur. Tech. Rep. (2011)
Keyphrases
</>
probabilistic model
computational model
hierarchical structure
experimental data
high level
cost function
probability distribution
statistical model
dependency graph
input data
intrusion detection
theoretical analysis
process model
mathematical model