Countermeasures and Tactics for Transitioning against the SSL/TLS Renegotiation Vulnerability.
Yuji SugaPublished in: IMIS (2012)
Keyphrases
- countermeasures
- information security
- semi supervised learning
- risk assessment
- parameter estimation
- attack graphs
- graph based semi supervised learning
- cyber attacks
- computer security
- java card
- rural areas
- network security
- security measures
- supervised learning
- feature selection
- power analysis
- data mining
- security breaches
- traffic accidents
- text classification
- active learning
- training data
- e learning
- information systems