Login / Signup
Rebound Attacks on Stribog.
Riham AlTawy
Aleksandar Kircanski
Amr M. Youssef
Published in:
ICISC (2013)
Keyphrases
</>
countermeasures
watermarking scheme
malicious attacks
attack detection
website
secure routing
denial of service attacks
security flaws
genetic algorithm
detecting malicious
malicious users
stream cipher
terrorist attacks
traffic analysis
security threats
dos attacks
security protocols
information security
multistage