The Feasibility and Inevitability of Stealth Attacks.
Ivan Yu. TyukinDesmond J. HighamEliyas WoldegeorgisAlexander N. GorbanPublished in: CoRR (2021)
Keyphrases
- countermeasures
- malicious attacks
- watermarking scheme
- security mechanisms
- malicious users
- attack detection
- case study
- traffic analysis
- watermarking algorithm
- computer security
- security protocols
- chosen plaintext
- database
- security threats
- cryptographic protocols
- signal processing
- database systems
- artificial intelligence
- genetic algorithm
- information retrieval