Login / Signup
The Retracing Boomerang Attack.
Orr Dunkelman
Nathan Keller
Eyal Ronen
Adi Shamir
Published in:
IACR Cryptol. ePrint Arch. (2019)
Keyphrases
</>
countermeasures
attack detection
website
data sets
neural network
social networks
e learning
secret key
ddos attacks
encryption algorithm
attack graph
malicious users