Sign in

-Attack.

Atsuko MiyajiYuuki Takano
Published in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2007)
Keyphrases
  • countermeasures
  • data sets
  • real time
  • malicious attacks
  • information systems
  • clustering algorithm
  • secret key
  • dos attacks
  • block cipher
  • detection mechanism
  • attack detection