Login / Signup

Artificial neural network-based methodology for vulnerabilities detection in EMV cards.

Noura OuerdiIlhame El FarissiAbdelmalek AziziMostafa Azizi
Published in: IAS (2015)
Keyphrases
  • security mechanisms
  • comprehensive analysis
  • detection algorithm
  • information security
  • security issues
  • data mining
  • smart card
  • resource constrained