Login / Signup
Prevention of Tunneling Attack in endairA.
Mohammad Fanaei
Ali Fanian
Mehdi Berenjkoub
Published in:
CSICC (2008)
Keyphrases
</>
denial of service
dos attacks
information systems
database
neural network
machine learning
power analysis
malicious attacks
expert systems
network security
countermeasures
key exchange protocol
block cipher
secret key
similarity measure
database systems
website
databases