Cryptography Reference
In-Depth Information
Fig. 9.8.
The trajectory obtained by an intruder triggered an alarm because of its
high degree of similarity to the training set.