Login / Signup
Device Attacker Models: Fact and Fiction.
Jiangshan Yu
Mark Dermot Ryan
Published in:
Security Protocols Workshop (2015)
Keyphrases
</>
probabilistic model
face recognition
model selection
statistical model
database
data sets
databases
real world
e learning
low cost
parameter estimation
computational models
accurate models