Login / Signup
Information Flow Containment: A Practical Basis for Malware Defense.
R. Sekar
Published in:
DBSec (2011)
Keyphrases
</>
information flow
flow analysis
social networks
information flows
communication networks
information security
real world
functional modules
flow graph
supply chain
network security
reverse engineering
intrusion detection
reactive systems
multi context systems
case study
control flow
decision making