Applying Provenance in APT Monitoring and Analysis: Practical Challenges for Scalable, Efficient and Trustworthy Distributed Provenance
暂无分享,去创建一个
Robert N. M. Watson | Jonathan Anderson | George Neville-Neil | Ripduman Sohan | Lucian Carata | Graeme Jenkinson | Thomas Bytheway | Brian J. Kidney | Amanda Strnad | Arun Thomas | R. Watson | J. Anderson | George Neville-Neil | R. Sohan | Arun Thomas | Lucian Carata | Graeme Jenkinson | Thomas Bytheway | B. Kidney | Amanda Strnad
[1] Andy Hopper,et al. HadoopProv: Towards Provenance as a First Class Citizen in MapReduce , 2013, TaPP.
[2] Randall Stewart,et al. Optimizing TLS for High–Bandwidth Applications in FreeBSD , 2015 .
[3] Ashish Gehani,et al. SPADE: Support for Provenance Auditing in Distributed Environments , 2012, Middleware.
[4] Andy Hopper,et al. OPUS: A Lightweight System for Observational Provenance in User Space , 2013, TaPP.
[5] Geoff Holmes,et al. Security and Data Accountability in Distributed Systems: A Provenance Survey , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.
[6] Margo I. Seltzer,et al. Provenance-Aware Storage Systems , 2006, USENIX ATC, General Track.
[7] Eric Michael Hutchins,et al. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains , 2010 .
[8] Marianne Winslett,et al. The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance , 2009, FAST.
[9] Andreas Haeberlen,et al. Tracking Adversarial Behavior in Distributed Systems With Secure Network Provenance , 2010 .
[10] Vladimiro Sassone,et al. A Formal Model of Provenance in Distributed Systems , 2009, Workshop on the Theory and Practice of Provenance.