Search alternatives:
attack technical » attacks technical, attacker technical, stack technical
technical paper » technical papers
world attack » world attacks, worm attack, world atlas

1
Published 2014
Springer International Publishing
Table of Contents: ... Clustering of Features Approach -- A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic...

2
Published 2014
Springer International Publishing
Table of Contents: ... Clustering of Features Approach -- A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic...