Keyphrases
Attacker
60%
Provenance Graph
51%
Software-defined Networking
49%
Serverless Computing
49%
Audit Log
48%
Data Provenance
46%
Operating System
38%
Event Log
37%
Linux
33%
Internet of Things
31%
System Auditing
29%
Vulnerability
29%
Causal Analysis
28%
Endpoint Detection
26%
System Log
23%
Adversary
21%
Control Plane
21%
System Layer
20%
Forensic
20%
Whole-system Provenance
19%
Branchless Banking
19%
Banking Application
19%
Co-resident
19%
Problem Analysis
19%
Bile
19%
Misinterpretation
19%
Fitness Trackers
19%
Firmware
19%
Real-time Systems
19%
Information Flow
18%
Linux Kernel
17%
Insecurity
17%
Audit Framework
17%
Provenance Analysis
17%
Developing World
17%
Privacy Boundaries
17%
Provenance Collection
17%
Intrusion Detection
17%
Tamper-evident
16%
Runtime Overhead
16%
USB Attack
16%
System Audit
16%
Provenance Tracking
16%
Watermarking
16%
Reduction Method
16%
Identity Management
16%
Access Management
16%
Triage
16%
Provenance Model
16%
Log Reduction
16%
Computer Science
Attackers
100%
Data Provenance
69%
Audit Log
62%
Software-Defined Networking
49%
Serverless Computing
44%
Internet-Of-Things
42%
Causal Analysis
34%
System Intrusion
31%
Operating System
31%
System Activity
27%
Access Control
25%
Automated Analysis
24%
Security Implication
24%
Control Plane
22%
Computer Hardware
22%
Application Event
21%
Access Control Policies
21%
Intrusion Detection
20%
Mandatory Access Control
19%
Watermarking
19%
Real Time Systems
19%
Speech Recognition
19%
Certificate Authority
19%
Problem Analysis
19%
Banking Application
19%
Smart Home Device
19%
Telecommunication
19%
Root Cause Analysis
19%
Identity and Access Management
19%
Application Layer
19%
Attack Scenario
18%
Cloud Environment
17%
semantic gap
17%
Cloud Computing
17%
Storage Overhead
16%
Physical Machine
16%
Side Channel
16%
Monitoring Tool
16%
Dependency Graph
15%
Software Stack
14%
Extensibility
14%
Data Exfiltration
14%
Systems and Application
14%
Operational Requirement
14%
Global Positioning System
14%
Case Study
14%
Security Application
14%
Information Flow Control
13%
Hardware Configuration
13%
Hypervisor
13%