共 21 条
[1]
Lime: Data lineage in the malicious environment
[J].
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
2014, 8743
:183-187
[2]
Croft J, 2011, 6 USENIX C HOT TOP S, P7
[3]
Gafny M., 2010, P 2010 ACM WORKSHOP, P3, DOI [DOI 10.1145/1866886.1866890, 10.1145/1866886.1866890]
[4]
GUPTA A, 2017, INT J ENG ADV TECHNO, V7, P153, DOI DOI 10.2174/2210315506666161116122434
[5]
A Probabilistic Approach for Guilty Agent Detection using Bigraph after Distribution of Sample Data
[J].
6TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS,
2018, 125
:662-668
[6]
Gupta K, 2018, 5 INT C COMP SUST GL, P3957
[8]
Ismail A, 2016, 3 MEC INT C BIG DAT, P1
[9]
Kaur Kuljeet, 2017, 2017 IEEE Power & Energy Society General Meeting, DOI 10.1109/PESGM.2017.8274627
[10]
Kaur K., 2017, Int. J. Netw. Secur. Its Appl, V9, P21, DOI [10.5121/ijnsa.2017.9502, DOI 10.5121/IJNSA.2017.9502]