Login / Signup
Launching Stealth Attacks using Cloud.
Moitrayee Chatterjee
Prerit Datta
Faranak Abri
Akbar Siami Namin
Keith S. Jones
Published in:
CoRR (2020)
Keyphrases
</>
cloud computing
countermeasures
malicious attacks
traffic analysis
security threats
data sets
data center
watermarking scheme
attack detection
chosen plaintext
digital image watermarking
malicious users
java card
watermarking algorithm
virtual machine
neural network
security protocols
database