-
1
Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism
Published 2024-03-01Subjects: “…provenance graph…”
Get full text
Article -
2
Review of threat discovery and forensic analysis based on system provenance graph
Published 2022-07-01Subjects: “…provenance graph…”
Get full text
Article