Cited By
View all- CHEN CWAN HZHAO X(2024)Log refusion: adversarial attacks against the integrity of application logs and defense methodsSCIENTIA SINICA Informationis10.1360/SSI-2024-004254:9(2157)Online publication date: 10-Sep-2024
- Goyal AWang GBates A(2024)R-CAID: Embedding Root Cause Analysis within Provenance-based Intrusion Detection2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00253(3515-3532)Online publication date: 19-May-2024
- Bansal AKandikuppa AHasan MChen CBates AMohan S(2023)System Auditing for Real-Time SystemsACM Transactions on Privacy and Security10.1145/362522926:4(1-37)Online publication date: 13-Nov-2023
- Show More Cited By