文
论文分享
演练场
杂货铺
论文推荐
字
编辑器下载
登录
注册
A distributed application is vulnerable to attack code masquerading as one of the components. An application that has been trained to recognize "itself" can reject such imposters. Intrusion Detecti o
复制论文ID
分享
摘要
作者
参考文献
暂无分享,去
创建一个
Carla Marceau
|
Maureen Stillman
|
Matthew Stillerman
保存到论文桶