Login / Signup
Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths.
Dinghao Liu
Qiushi Wu
Shouling Ji
Kangjie Lu
Zhenguang Liu
Jianhai Chen
Qinming He
Published in:
CCS (2021)
Keyphrases
</>
access control
information security
intrusion detection
security requirements
security issues
computer security
security problems
data security
databases
statistical databases
network management
security systems
security threats