Login / Signup
Artificial neural network-based methodology for vulnerabilities detection in EMV cards.
Noura Ouerdi
Ilhame El Farissi
Abdelmalek Azizi
Mostafa Azizi
Published in:
IAS (2015)
Keyphrases
</>
security mechanisms
comprehensive analysis
detection algorithm
information security
security issues
data mining
smart card
resource constrained