Search alternatives:
attack technical » attacks technical, attacker technical, stack technical
technical paper » technical papers
word attack » world attack, worm attack, work attack

1
Published 2014
Springer International Publishing
Table of Contents: ... Clustering of Features Approach -- A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic...

2
Published 2014
Springer International Publishing
Table of Contents: ... Clustering of Features Approach -- A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic...