Login / Signup
The Many Kinds of Creepware Used for Interpersonal Attacks.
Kevin A. Roundy
Paula Barmaimon Mendelberg
Nicola Dell
Damon McCoy
Daniel Nissani
Thomas Ristenpart
Acar Tamersoy
Published in:
IEEE Symposium on Security and Privacy (2020)
Keyphrases
</>
countermeasures
terrorist attacks
watermarking scheme
computer security
security protocols
security threats
database
web services
computer systems
online communities
watermarking algorithm
image watermarking
malicious users