Login / Signup
-Attack.
Atsuko Miyaji
Yuuki Takano
Published in:
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2007)
Keyphrases
</>
countermeasures
data sets
real time
malicious attacks
information systems
clustering algorithm
secret key
dos attacks
block cipher
detection mechanism
attack detection