Login / Signup

Cryptographically Generated Addresses (CGAs): Possible Attacks and Proposed Mitigation Approaches.

Ahmad AlSa'dehHosnieh RafieeChristoph Meinel
Published in: CIT (2012)
Keyphrases
  • information systems
  • strengths and weaknesses
  • countermeasures
  • artificial intelligence
  • feature selection
  • web services
  • machine learning algorithms
  • machine learning methods
  • risk management