Login / Signup
On Coverage-Based Attack Profiles.
Anthony Thyron Rivers
Mladen A. Vouk
Laurie A. Williams
Published in:
SERE (Companion) (2014)
Keyphrases
</>
injection attacks
countermeasures
user profiles
real world
machine learning
expert systems
secret key
authentication protocol
detection mechanism
power analysis
attack detection
abstract argumentation
key exchange protocol
collaborative recommender systems