Login / Signup
Defending against Malicious Peripherals with Cinch.
Sebastian Angel
Riad S. Wahby
Max Howald
Joshua B. Leners
Michael Spilo
Zhen Sun
Andrew J. Blumberg
Michael Walfish
Published in:
USENIX Security Symposium (2016)
Keyphrases
</>
malicious attacks
malicious behavior
low power
detect malicious
malicious users
ddos attacks
malicious code
data mining
computer vision
decision making
decision trees
special case
data sets
pre determined
machine learning
insider threat
real world
databases