Login / Signup
Secure network provenance.
Wenchao Zhou
Qiong Fei
Arjun Narayan
Andreas Haeberlen
Boon Thau Loo
Micah Sherr
Published in:
SOSP (2011)
Keyphrases
</>
lightweight
data sets
network traffic
databases
metadata
bayesian networks
network structure
communication networks
security analysis
security measures
artificial neural networks
wireless sensor networks
computer networks
network architecture
key management
security protocols