Mitigating replay attacks using Darwinian-based Feature Extraction.
Joseph SheltonJoshua AdamsAniesha AlfordMelissa A. VenableSabra NealGerry V. DozierKelvin S. BryantPublished in: CISDA (2012)
Keyphrases
- feature extraction
- evolutionary computation
- countermeasures
- preprocessing
- feature selection
- feature vectors
- malicious attacks
- pattern classification
- image processing
- face recognition
- linear discriminant analysis
- dimension reduction
- feature set
- dimensionality reduction
- pattern recognition
- linear feature extraction
- image classification
- principal component analysis
- discriminant analysis
- image preprocessing
- extracted features
- traffic analysis
- security threats
- watermarking algorithm
- attack detection
- feature extractors
- denial of service attacks
- feature extraction and classification
- defect detection
- feature space
- frequency domain
- security mechanisms
- face images
- evolutionary algorithm
- texture analysis
- wavelet transform
- machine learning
- texture features
- terrorist attacks
- malicious users
- computational intelligence