Articles with "provenance based" as a keyword



Photo by krakenimages from unsplash

PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2016.2530705

Abstract: Delay tolerant networks (DTNs) are often encountered in military network environments where end-to-end connectivity is not guaranteed due to frequent disconnection or delay. This work proposes a provenance-based trust framework, namely PROVEST (PROVEnance-baSed Trust model)… read more here.

Keywords: delay tolerant; trust; delay; provenance based ... See more keywords
Photo from wikipedia

Paradise: Real-Time, Generalized, and Distributed Provenance-Based Intrusion Detection

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2022.3160879

Abstract: Identifying intrusion from massive and multi-source logs accurately and in real-time presents challenges for today's users. This article presents Paradise, a real-time, generalized, and distributed provenance-based intrusion detection method. Paradise introduces a novel extract strategy… read more here.

Keywords: time; provenance based; detection; real time ... See more keywords