Login / Signup
Where Do All the Attacks Go?
Dinei Florêncio
Cormac Herley
Published in:
WEIS (Springer Volume) (2011)
Keyphrases
</>
countermeasures
security mechanisms
traffic analysis
malicious attacks
attack detection
computer security
cyber attacks
security threats
denial of service attacks
digital image watermarking
database
wireless sensor networks
watermarking scheme
security requirements
security protocols
security vulnerabilities