Login / Signup
Pervasive Monitoring Is an Attack.
Stephen Farrell
Hannes Tschofenig
Published in:
RFC (2014)
Keyphrases
</>
monitoring system
real time
context aware
malicious attacks
artificial intelligence
information systems
decision support
secret key
tool wear
power analysis
database
data sets
countermeasures
pervasive computing
authentication protocol