no code implementations • 26 Jun 2021 • Ivan Y. Tyukin, Desmond J. Higham, Alexander Bastounis, Eliyas Woldegeorgis, Alexander N. Gorban
Such a stealth attack could be conducted by a mischievous, corrupt or disgruntled member of a software development team.