Sign in

Using Context and Provenance to defend against USB-borne attacks.

Tobias MuellerEphraim ZimmerLudovico de Nittis
Published in: ARES (2019)
Keyphrases
  • contextual information
  • context sensitive
  • real time
  • data sets
  • databases
  • case study
  • anomaly detection
  • context dependent
  • data transmission