Sign in

The Return of the Sensitivity Attack.

Pedro ComesañaLuis Pérez-FreireFernando Pérez-González
Published in: IWDW (2005)
Keyphrases
  • sensitivity analysis
  • countermeasures
  • malicious attacks
  • high sensitivity
  • detection mechanism
  • computer vision
  • information systems
  • database systems
  • secret key
  • attack detection