Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 journals/corr/BatesBDRCMS16
%A Bates, Adam
%A Butler, Kevin R. B.
%A Dobra, Alin
%A Reaves, Bradley
%A II, Patrick T. Cable
%A Moyer, Thomas
%A Schear, Nabil
%D 2016
%J CoRR
%K dblp
%T Retrofitting Applications with Provenance-Based Security Monitoring.
%U http://dblp.uni-trier.de/db/journals/corr/corr1609.html#BatesBDRCMS16
%V abs/1609.00266
@article{journals/corr/BatesBDRCMS16,
added-at = {2019-03-19T00:00:00.000+0100},
author = {Bates, Adam and Butler, Kevin R. B. and Dobra, Alin and Reaves, Bradley and II, Patrick T. Cable and Moyer, Thomas and Schear, Nabil},
biburl = {https://www.bibsonomy.org/bibtex/22c6deb53f7c8511ce23c894e7ed6739b/dblp},
ee = {http://arxiv.org/abs/1609.00266},
interhash = {176633c69a4a94efeba4e12abc252e4c},
intrahash = {2c6deb53f7c8511ce23c894e7ed6739b},
journal = {CoRR},
keywords = {dblp},
timestamp = {2019-03-20T11:36:36.000+0100},
title = {Retrofitting Applications with Provenance-Based Security Monitoring.},
url = {http://dblp.uni-trier.de/db/journals/corr/corr1609.html#BatesBDRCMS16},
volume = {abs/1609.00266},
year = 2016
}