Login / Signup

Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications.

Omar AlrawiAziz Mohaisen
Published in: WWW (Companion Volume) (2016)
Keyphrases
  • real time
  • malicious users
  • databases
  • bayesian networks
  • multi agent
  • access control
  • deeper understanding