Login / Signup
Randomizing the replacement attack.
Darko Kirovski
Zeph Landau
Published in:
ICASSP (5) (2004)
Keyphrases
</>
countermeasures
attack detection
malicious users
detection mechanism
key exchange protocol
data mining
machine learning
web pages
case study
web applications
multistage
denial of service attacks
malicious attacks