Login / Signup
An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks.
Danilo Bruschi
Lorenzo Cavallaro
Andrea Lanzi
Published in:
IPCCC (2007)
Keyphrases
</>
malicious attacks
database
neural network
countermeasures
cyber attacks
traffic analysis
case study
cooperative
image watermarking
java card