Login / Signup
Closing Cluster Attack Windows Through Server Redundancy and Rotations.
Yih Huang
David Arsenault
Arun Sood
Published in:
CCGRID (2006)
Keyphrases
</>
microsoft windows
clustering algorithm
windows nt
database
authentication protocol
client server
authentication mechanism
data clustering
operating system
data points
cluster analysis
hierarchical structure
hierarchical clustering
pose estimation
countermeasures
secret key
database applications
database systems