Inference attack

Results: 15



#Item
11Cyberwarfare / Substitution cipher / Cipher / Applied mathematics / Known-plaintext attack / Cryptanalysis / Classical cipher / Four-square cipher / Cryptography / Stream ciphers / Espionage

Bayesian Inference for Zodiac and Other Homophonic Ciphers Sujith Ravi and Kevin Knight University of Southern California Information Sciences Institute Marina del Rey, California 90292 {sravi,knight}@isi.edu

Add to Reading List

Source URL: www.aclweb.org

Language: English - Date: 2011-05-20 17:35:58
12Cyberwarfare / Substitution cipher / Cipher / Applied mathematics / Known-plaintext attack / Cryptanalysis / Classical cipher / Four-square cipher / Cryptography / Stream ciphers / Espionage

Bayesian Inference for Zodiac and Other Homophonic Ciphers Sujith Ravi and Kevin Knight University of Southern California Information Sciences Institute Marina del Rey, California 90292 {sravi,knight}@isi.edu

Add to Reading List

Source URL: aclweb.org

Language: English - Date: 2011-05-20 17:35:58
13Logical consequence / Reasoning / Arguments / Critical thinking / Inference / Probabilistic logic / Bayesian network / Defeasible reasoning / Entailment / Logic / Science / Knowledge

Inference and Attack in Bayesian Networks Sjoerd T. Timmer a John-Jules Ch. Meyer a Silja Renooij a

Add to Reading List

Source URL: www.cs.uu.nl

Language: English - Date: 2013-12-16 11:40:03
14Perceptual attack time / Rhythm / High frequency content measure / Statistical inference / Regression analysis / Autocorrelation / Estimation theory / Perception / Variance / Statistics / Experimental psychology / Signal processing

PDF Document

Add to Reading List

Source URL: ccrma.stanford.edu

Language: English
15Statistics / Database management systems / Reasoning / Data security / Inference attack / Inference / Data mining / Statistical inference / Database / Logic / Science / Computer security

Untitled

Add to Reading List

Source URL: andromeda.rutgers.edu

Language: English - Date: 2002-04-08 14:03:42
UPDATE