Login / Signup
Correlation Attacks on Up/Down and Stop/Go Cascades.
Renato Menicocci
Jovan Dj. Golic
Published in:
IEEE Trans. Inf. Theory (1999)
Keyphrases
</>
countermeasures
correlation coefficient
malicious attacks
security threats
watermarking scheme
real time
attack detection
neural network
data sets
operating system
anomaly detection
information systems
diffusion process
correlation analysis
security mechanisms
traffic analysis
database
malicious users