Login / Signup
Trojan of Things: Embedding Malicious NFC Tags into Common Objects.
Seita Maruyama
Satohiro Wakabayashi
Tatsuya Mori
Published in:
CoRR (2017)
Keyphrases
</>
moving objects
mobile devices
multiple objects
d objects
data objects
data points
principal component analysis
mobile phone
intrusion detection
vector space
spatial relationships
object classes
bounding box
malicious behavior