Login / Signup

Provenance-aware security risk analysis for hosts and network flows.

Mohsen RezvaniAleksandar IgnjatovicElisa BertinoSanjay K. Jha
Published in: NOMS (2014)
Keyphrases