Cloak and Dagger: Man-In-The-Middle and Other Insidious Attacks.
Ramakrishna ThurimellaWilliam MitchellPublished in: Int. J. Inf. Secur. Priv. (2009)
Keyphrases
- test bed
- countermeasures
- computer security
- malicious attacks
- traffic analysis
- watermarking scheme
- neural network
- round trip
- wireless sensor networks
- ddos attacks
- website
- data publishing
- denial of service attacks
- data mining
- attack detection
- malicious users
- digital image watermarking
- real time
- secure routing
- security flaws