Login / Signup
Contagion in Cybersecurity Attacks.
Adrian Baldwin
Iffat Gheyas
Christos Ioannidis
David J. Pym
Julian Williams
Published in:
WEIS (2012)
Keyphrases
</>
countermeasures
watermarking scheme
malicious users
attack detection
terrorist attacks
malicious attacks
social networks
machine learning and data mining
information diffusion
watermarking technique
traffic analysis
denial of service attacks
chosen plaintext
data mining
digital image watermarking
human decision making
security risks
security protocols
security mechanisms
social influence
watermarking algorithm