Experimental challenges in cyber security: a story of provenance and lineage for malware
CSET'11 Proceedings of the 4th conference on Cyber security experimentation and test
Hi-index | 0.00 |
One of the unanticipated consequences of the Internet age is a pervasive loss of context. Information is often filtered, sampled, repackaged, condensed, or altered to suit any number of purposes. Over time, the entropy of these processes causes information to lose its essential validity. This column argues the needs, applications, and challenges of providing greater access to data provenance in information systems.