Login / Signup

A Study on Noise-Tolerant PN Code-Based Localization Attacks to Internet Threat Monitors by Exploiting Multiple Ports.

Masaki NaritaBhed Bahadur BistaToyoo Takata
Published in: AINA (2013)
Keyphrases
  • noise tolerant
  • noisy data
  • lower bound
  • cost function
  • upper bound
  • countermeasures
  • instance based learning algorithms