Author:
Yavuz Attila Altay,Ning Peng
Cited by
52 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE;2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom);2023-12-21
2. SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions;2023 IEEE Symposium on Security and Privacy (SP);2023-05
3. Logging Practices in Software Engineering: A Systematic Mapping Study;IEEE Transactions on Software Engineering;2023-02-01
4. SealFSv2: combining storage-based and ratcheting for tamper-evident logging;International Journal of Information Security;2022-12-06
5. Tamper-Proof Storage of User Movement Logs in Smart Parks;2022 7th International Conference on Communication, Image and Signal Processing (CCISP);2022-11