Abstract: Ever-growing cyber attacks threaten organizational and national security. Provenance graph analysis effectively detects attacks through system audit anomalies but demands prohibitively ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results