Login / Signup
Acnn: arbitrary trace attacks based on leakage area detection.
Chong Xiao
Ming Tang
Published in:
Int. J. Inf. Sec. (2024)
Keyphrases
</>
detection algorithm
network attacks
detection method
false positives
automatic detection
countermeasures
attack detection
object detection
false alarms
detection accuracy
security threats
database
face recognition
email