Login / Signup

Discovering reliable evidence of data misuse by exploiting rule redundancy.

Laura GengaNicola ZannoneAnna Cinzia Squicciarini
Published in: Comput. Secur. (2019)
Keyphrases