Login / Signup
Using Context and Provenance to defend against USB-borne attacks.
Tobias Mueller
Ephraim Zimmer
Ludovico de Nittis
Published in:
ARES (2019)
Keyphrases
</>
contextual information
context sensitive
real time
data sets
databases
case study
anomaly detection
context dependent
data transmission