×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [malicious service invocations]
Monitoring-Based System for E2E Security Auditing and Enforcement in Trusted and Untrusted SOA
223 views
Northrop Grumman Cybersecurity Research Consortium (NGCRC) Spring 2014 Symposium 28 May 2014 Bharat Bhargava Purdue University End-to-End Security Policy
216 views