Cited By
View all- Satpathy UBorse HChakraborty S(2025)Towards Generating a Robust, Scalable and Dynamic Provenance Graph for Attack Investigation over Distributed Microservice Architecture2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)10.1109/COMSNETS63942.2025.10885639(566-574)Online publication date: 6-Jan-2025
- Addetla SPachamuthu R(2025)Amalgamation of Divergent Logs for Detection of Advanced Persistent Threats in Cyber Threat AnalysisFifth International Conference on Computing and Network Communications10.1007/978-981-97-4540-1_35(473-488)Online publication date: 6-Feb-2025
- Yin YHe XLiao Y(2024)APT Attack Detection Method Based on Traceability GraphJournal of Intelligence and Knowledge Engineering10.62517/jike.2024042152:2(82-85)Online publication date: Jun-2024
- Show More Cited By