Sign in

Detecting Suspicious File Migration or Replication in the Cloud.

Adam BowersCong LiaoDouglas SteiertDan LinAnna Cinzia SquicciariniAli R. Hurson
Published in: IEEE Trans. Dependable Secur. Comput. (2021)
Keyphrases