Cited By
View all- Li LChen W(2024)ConGraph: Advanced Persistent Threat Detection Method Based on Provenance Graph Combined with Process Context in Cyber-Physical System EnvironmentElectronics10.3390/electronics1305094513:5(945)Online publication date: 29-Feb-2024
- CHEN CWAN HZHAO X(2024)Log refusion: adversarial attacks against the integrity of application logs and defense methodsSCIENTIA SINICA Informationis10.1360/SSI-2024-004254:9(2157)Online publication date: 10-Sep-2024
- Xu BGong YGeng XLi YDong CLiu SLiu YJiang BLu Z(2024)ProcSAGE: an efficient host threat detection method based on graph representation learningCybersecurity10.1186/s42400-024-00240-w7:1Online publication date: 25-Aug-2024
- Show More Cited By