Login / Signup
Degradation and Subversion through Subsystem Attacks.
Daniel Bilar
Published in:
IEEE Secur. Priv. (2010)
Keyphrases
</>
countermeasures
watermarking scheme
malicious attacks
security mechanisms
computer security
digital image watermarking
database
malicious users
attack detection
traffic analysis
ddos attacks
watermarking technique
watermarking algorithm
real time
terrorist attacks
multiscale
security vulnerabilities
case study