Login / Signup

Characterizing the Security of Endogenous and Exogenous Desktop Application Network Flows.

Matthew R. McNieceRuidan LiBradley Reaves
Published in: PAM (2021)
Keyphrases
  • network flow
  • user interface
  • intrusion detection
  • network security
  • genetic algorithm
  • search algorithm
  • video conferencing
  • min cost