ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2006.01722
  4. Cited By
Threat Detection and Investigation with System-level Provenance Graphs:
  A Survey

Threat Detection and Investigation with System-level Provenance Graphs: A Survey

2 June 2020
Zhenyuan Li
Qi Alfred Chen
Runqing Yang
Yan Chen
ArXivPDFHTML

Papers citing "Threat Detection and Investigation with System-level Provenance Graphs: A Survey"

5 / 5 papers shown
Title
UNICORN: Runtime Provenance-Based Detector for Advanced Persistent
  Threats
UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats
Xueyuan Han
Thomas Pasquier
Adam Bates
James W. Mickens
Margo Seltzer
46
271
0
06 Jan 2020
Generalizing from a Few Examples: A Survey on Few-Shot Learning
Generalizing from a Few Examples: A Survey on Few-Shot Learning
Yaqing Wang
Quanming Yao
James T. Kwok
L. Ni
66
1,802
0
10 Apr 2019
HOLMES: Real-time APT Detection through Correlation of Suspicious
  Information Flows
HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows
Sadegh M. Milajerdi
Rigel Gjomemo
Birhanu Eshete
R. Sekar
V. Venkatakrishnan
22
393
0
03 Oct 2018
Provenance-based Intrusion Detection: Opportunities and Challenges
Provenance-based Intrusion Detection: Opportunities and Challenges
Xueyuan Han
Thomas Pasquier
Margo Seltzer
15
45
0
04 Jun 2018
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
M. Hossain
Sadegh M. Milajerdi
Junao Wang
Birhanu Eshete
Rigel Gjomemo
R. Sekar
Scott D. Stoller
V. Venkatakrishnan
20
217
0
06 Jan 2018
1