"Retrofitting Applications with Provenance-Based Security Monitoring."

Adam Bates et al. (2016)

Details and statistics

DOI:

access: open

type: Informal or Other Publication

metadata version: 2019-03-19