Login / Signup

Vesper: Using Echo Analysis to Detect Man-in-the-Middle Attacks in LANs.

Yisroel MirskyNaor KalboYuval EloviciAsaf Shabtai
Published in: IEEE Trans. Inf. Forensics Secur. (2019)
Keyphrases
  • statistical analysis
  • database
  • data sets
  • automatic detection
  • databases
  • neural network
  • social networks
  • decision trees
  • data analysis
  • image analysis
  • detection mechanism