Login / Signup
Two-phase Attacks in Security Games.
Andrzej Nagórko
Pawel Ciosmak
Tomasz P. Michalak
Published in:
UAI (2023)
Keyphrases
</>
countermeasures
security mechanisms
watermarking scheme
malicious users
traffic analysis
denial of service attacks
malicious attacks
data publishing
chosen plaintext
differential power analysis
stream cipher
security vulnerabilities
databases
case study
neural network
security protocols
security flaws