搜索资源列表
A-Taxonomy-and-Adversarial-Model-for
- In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have been put forth to sanitize this sensitive data source in order to
A_SURVEY_OF_Trust_in_internet_Application
- 讲述因特网应用中,关于信任的发展调查等内容。是对网络信任模型介绍的很好的一片文章-About internet applications, the development of trust investigation on the content. Network trust model is well described in an article
