Cited By
View all- Fei KZhou JSu LWang WChen Y(2024)Log2Graph: A graph convolution neural network based method for insider threat detectionJournal of Computer Security10.3233/JCS-230092(1-24)Online publication date: 24-Apr-2024
- Li TLiu XQiao WZhu XShen YMa J(2024)T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs CorrelationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.327391821:3(1179-1195)Online publication date: May-2024
- Liao HLeng SYang JXu JZhang JTang J(2024)A Robust and Efficient Risk Assessment Framework for Multi-Step Attacks2024 7th International Conference on Information and Computer Technologies (ICICT)10.1109/ICICT62343.2024.00056(309-314)Online publication date: 15-Mar-2024
- Show More Cited By