Contagion in Cybersecurity Attacks.
Adrian BaldwinIffat GheyasChristos IoannidisDavid J. PymJulian WilliamsPublished in: WEIS (2012)
Keyphrases
- countermeasures
- watermarking scheme
- malicious users
- attack detection
- terrorist attacks
- malicious attacks
- social networks
- machine learning and data mining
- information diffusion
- watermarking technique
- traffic analysis
- denial of service attacks
- chosen plaintext
- data mining
- digital image watermarking
- human decision making
- security risks
- security protocols
- security mechanisms
- social influence
- watermarking algorithm