Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2016.2530705
Abstract: Delay tolerant networks (DTNs) are often encountered in military network environments where end-to-end connectivity is not guaranteed due to frequent disconnection or delay. This work proposes a provenance-based trust framework, namely PROVEST (PROVEnance-baSed Trust model)…
read more here.
Keywords:
delay tolerant;
trust;
delay;
provenance based ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2022.3160879
Abstract: Identifying intrusion from massive and multi-source logs accurately and in real-time presents challenges for today's users. This article presents Paradise, a real-time, generalized, and distributed provenance-based intrusion detection method. Paradise introduces a novel extract strategy…
read more here.
Keywords:
time;
provenance based;
detection;
real time ... See more keywords