Author:
Taylor Curtis R.,MacFarland Douglas C.,Smestad Doran R.,Shue Craig A.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. By Your Command: Extracting the User Actions that Create Network Flows in Android;2023 14th International Conference on Network of the Future (NoF);2023-10-04
2. Detecting Root-Level Endpoint Sensor Compromises with Correlated Activity;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2019
3. T
rident;Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication;2018-08-07