Cited By
View all- Lv YQin SZhu ZYu ZLi SHan W(2022)A Review of Provenance Graph based APT Attack Detection:Applications and Developments2022 7th IEEE International Conference on Data Science in Cyberspace (DSC)10.1109/DSC55868.2022.00075(498-505)Online publication date: Jul-2022
- Yagemann CNoureddine MHassan WChung SBates ALee WKim YKim JVigna GShi E(2021)Validating the Integrity of Audit Logs Against Execution Repartitioning AttacksProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3484551(3337-3351)Online publication date: 12-Nov-2021
- Grayson SAguilar FMilewicz RKatz DMarinov D(2024)A benchmark suite and performance analysis of user-space provenance collectorsProceedings of the 2nd ACM Conference on Reproducibility and Replicability10.1145/3641525.3663627(85-95)Online publication date: 18-Jun-2024
- Show More Cited By