Login / Signup
Wiretap-channels under constrained active and passive attacks.
Carsten Rudolf Janda
Moritz Wiese
Janis Nötzel
Holger Boche
Eduard A. Jorswieck
Published in:
CNS (2015)
Keyphrases
</>
countermeasures
malicious users
multiscale
constrained problems
malicious attacks
data sets
search engine
email
computer security
terrorist attacks
data corruption