Hang with your buddies to resist intersection attacks.
David Isaac WolinskyEwa SytaBryan FordPublished in: CCS (2013)
Keyphrases
- countermeasures
- malicious attacks
- watermarking scheme
- traffic analysis
- electron beam
- neural network
- security flaws
- watermarking algorithm
- computer security
- detect malicious
- attack detection
- denial of service attacks
- differential power analysis
- malicious users
- security threats
- ddos attacks
- security protocols
- network traffic
- learning algorithm