Login / Signup
Oblivious signature-based envelope.
Ninghui Li
Wenliang Du
Dan Boneh
Published in:
Distributed Comput. (2005)
Keyphrases
</>
network traffic
anomaly detection
intrusion detection
network intrusion detection
malicious executables
document image retrieval
machine learning
intrusion detection system
data mining
malware detection
search engine
multiscale
pairwise
artificial neural networks
data processing