Time-Centric Modeling of Correct Behaviors for Efficient Non-intrusive Runtime Detection of Unauthorized System Actions
License:
Creative Commons 2.5 - PDF document
- 346.75 KB
- 8 downloads
- Download
- PDF version
- Printer-friendly version