Protection of flows under targeted attacks.
Jannik MatuschkeS. Thomas McCormickGianpaolo OrioloBritta PeisMartin SkutellaPublished in: CoRR (2016)
Keyphrases
- countermeasures
- protection mechanisms
- information security
- biometric template
- security threats
- malicious attacks
- information systems
- data mining
- watermarking scheme
- computer security
- data corruption
- denial of service attacks
- attack detection
- malicious users
- protection schemes
- protection scheme
- security risks
- traffic analysis
- image watermarking
- security protocols
- web services