Login / Signup

Randomizing the replacement attack.

Darko KirovskiZeph Landau
Published in: ICASSP (5) (2004)
Keyphrases
  • countermeasures
  • attack detection
  • malicious users
  • detection mechanism
  • key exchange protocol
  • data mining
  • machine learning
  • web pages
  • case study
  • web applications
  • multistage
  • denial of service attacks
  • malicious attacks