Login / Signup

Device Attacker Models: Fact and Fiction.

Jiangshan YuMark Dermot Ryan
Published in: Security Protocols Workshop (2015)
Keyphrases
  • probabilistic model
  • face recognition
  • model selection
  • statistical model
  • database
  • data sets
  • databases
  • real world
  • e learning
  • low cost
  • parameter estimation
  • computational models
  • accurate models