Login / Signup
Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications.
Omar Alrawi
Aziz Mohaisen
Published in:
WWW (Companion Volume) (2016)
Keyphrases
</>
real time
malicious users
databases
bayesian networks
multi agent
access control
deeper understanding