Login / Signup

A Novel Method to Detect Encrypted Data Exfiltration.

Gaofeng HeTao ZhangYuanyuan MaBingfeng Xu
Published in: CBD (2014)
Keyphrases
  • information systems
  • database
  • databases
  • third party
  • encryption algorithm