Login / Signup
Attack of the Clones.
David N. L. Levy
Published in:
J. Int. Comput. Games Assoc. (2011)
Keyphrases
</>
countermeasures
source code
software systems
data sets
malicious users
attack graphs
attack detection
malicious attacks
dos attacks
cooperative
block cipher
detection mechanism
web services
e learning
attack graph
information systems
data mining