Login / Signup

Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers.

Karel DurkotaViliam LisýChristopher KiekintveldKarel HorákBranislav BosanskýTomás Pevný
Published in: GameSec (2017)
Keyphrases