Login / Signup
Provenance Threat Modeling.
Oluwakemi Hambolu
Lu Yu
Jon Oakley
Richard R. Brooks
Ujan Mukhopadhyay
Anthony Skjellum
Published in:
CoRR (2017)
Keyphrases
</>
metadata
databases
information retrieval
genetic algorithm
social networks
computer vision
information systems
database systems
fine grained
modeling method