Login / Signup

An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks.

Danilo BruschiLorenzo CavallaroAndrea Lanzi
Published in: IPCCC (2007)
Keyphrases
  • malicious attacks
  • database
  • neural network
  • countermeasures
  • cyber attacks
  • traffic analysis
  • case study
  • cooperative
  • image watermarking
  • java card