Login / Signup
Characterizing the Security of Endogenous and Exogenous Desktop Application Network Flows.
Matthew R. McNiece
Ruidan Li
Bradley Reaves
Published in:
PAM (2021)
Keyphrases
</>
network flow
user interface
intrusion detection
network security
genetic algorithm
search algorithm
video conferencing
min cost