overarching protection against strategic attacks.
Gregory LevitinKjell HauskenPublished in: J. Oper. Res. Soc. (2012)
Keyphrases
- countermeasures
- security threats
- case study
- attack detection
- malicious attacks
- malicious users
- knowledge management
- watermarking scheme
- denial of service attacks
- data mining
- information warfare
- terrorist attacks
- traffic analysis
- computer security
- neural network
- image watermarking
- security protocols
- competitive environment
- cooperative
- stream cipher
- decision making
- data corruption
- chosen plaintext