Login / Signup
On the vulnerability of ECG verification to online presentation attacks.
Nima Karimian
Damon L. Woodard
Domenic Forte
Published in:
IJCB (2017)
Keyphrases
</>
online learning
java card
digital images
security risks
real time
cryptographic protocols
monitoring system
countermeasures
formal methods
denial of service
terrorist attacks
malicious attacks
asynchronous circuits
traffic analysis
online services
signal processing
multimedia
search engine
neural network