Cited By
View all- Li JLi TZhang RWu DYue HYang Z(2023)APM: An Attack Path-based Method for APT Attack Detection on Few-Shot Learning2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom60117.2023.00025(10-19)Online publication date: 1-Nov-2023
- Inam MChen YGoyal ALiu JMink JMichael NGaur SBates AHassan W(2023)SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179405(2620-2638)Online publication date: May-2023
- Isaac Abiodun OAlawida MEsther Omolara AAlabdulatif A(2022)Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A surveyJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2022.10.01834:10(10217-10245)Online publication date: Dec-2022
- Show More Cited By