Do Not Model the Attacker (Transcript of Discussion).
Jan MeierPublished in: Security Protocols Workshop (2008)
Keyphrases
- high level
- cost function
- computational model
- formal model
- probabilistic model
- management system
- experimental data
- em algorithm
- mathematical model
- network model
- real time
- parameter values
- neural network model
- process model
- parameter estimation
- input data
- probability distribution
- multiscale
- similarity measure
- neural network