Login / Signup
A New Attack on the Filter Generator.
Sondre Rønjom
Tor Helleseth
Published in:
IEEE Trans. Inf. Theory (2007)
Keyphrases
</>
noise reduction
countermeasures
detection mechanism
data mining
preprocessing step
morphological filters
low pass filter
filtering scheme
attack graph
data corruption