Sign in
Designing a fast log-tracing scheme for targeted attack prevention.
Takuya Suzuki
Koki Ikeda
Pichaya Kietkaroon
Junichi Murayama
Takahiro Hamada
Yuichi Murata
Published in:
APSITT (2015)
Keyphrases
</>
neural network
case study
image quality
authentication protocol
secret sharing scheme
database
data sets
classification scheme
representation scheme
security analysis
key distribution
malicious users