Login / Signup
Cryptographically Generated Addresses (CGAs): Possible Attacks and Proposed Mitigation Approaches.
Ahmad AlSa'deh
Hosnieh Rafiee
Christoph Meinel
Published in:
CIT (2012)
Keyphrases
</>
information systems
strengths and weaknesses
countermeasures
artificial intelligence
feature selection
web services
machine learning algorithms
machine learning methods
risk management