Login / Signup
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Hilmi Günes Kayacik
A. Nur Zincir-Heywood
Published in:
PST (2008)
Keyphrases
</>
malicious attacks
detection accuracy
automatic detection
object detection
detection algorithm
detection method
false positives
detection rate
attack detection
detection scheme
network attacks
database
face recognition
countermeasures
target detection
normal traffic