Login / Signup
Protecting the ESP8266 Module from Replay Attacks.
Ivan Vaccari
Maurizio Aiello
Federico Pastorino
Enrico Cambiaso
Published in:
CCCI (2020)
Keyphrases
</>
countermeasures
protection mechanisms
malicious attacks
security threats
traffic analysis
malicious users
human computation
terrorist attacks
genetic algorithm
watermarking scheme
security mechanisms
security protocols
computer assisted language learning
unauthorized access