Login / Signup
Oblivious signature-based envelope.
Ninghui Li
Wenliang Du
Dan Boneh
Published in:
PODC (2003)
Keyphrases
</>
network intrusion detection
intrusion detection
anomaly detection
network traffic
intrusion detection system
information retrieval
case study
pairwise
malicious executables