Cited By
View all- Bansal AKandikuppa AHasan MChen CBates AMohan S(2023)System Auditing for Real-Time SystemsACM Transactions on Privacy and Security10.1145/362522926:4(1-37)Online publication date: 13-Nov-2023
- Dong FLi SJiang PLi DWang HHuang LXiao XChen JLuo XGuo YChen XMeng WJensen CCremers CKirda E(2023)Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response ToolsProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616580(2396-2410)Online publication date: 15-Nov-2023
- Inam MChen YGoyal ALiu JMink JMichael NGaur SBates AHassan W(2023)SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179405(2620-2638)Online publication date: May-2023
- Show More Cited By