Login / Signup
Using Network Tainting to Bound the Scope of Network Ingress Attacks.
Peter Mell
Richard E. Harang
Published in:
SERE (2014)
Keyphrases
</>
network structure
computer networks
real time
neural network
peer to peer
network traffic
communication networks
network model
network architecture
traffic analysis
data sets
upper bound
network management