Author:
Zhou Wenchao,Fei Qiong,Narayan Arjun,Haeberlen Andreas,Loo Boon Thau,Sherr Micah
Cited by
61 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. PROV5GC: Hardening 5G Core Network Security with Attack Detection and Attribution Based on Provenance Graphs;Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks;2024-05-27
2. Listeria monocytogenes y mecanismo de caballo de Troya a través de la barrera hematoencefálica;Revista Digital de Postgrado;2024-05-06
3. Protecting Critical Infrastructure: Strategies for Managing Cybersecurity Risks in Nuclear Fusion Facilities;2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom);2023-12-21
4. Reliable Data Provenance in HCN;Wireless Networks;2023-12-19
5. Introduction;Wireless Networks;2023-12-19