Time-Centric Modeling of Correct Behaviors for Efficient Non-intrusive Runtime Detection of Unauthorized System Actions

Namesort iconValue
MIME typeapplication/pdf
Size346.75 KB