• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4608647)   Today's Articles (4605)   Subscriber (49375)
For: Li Z, Chen QA, Yang R, Chen Y, Ruan W. Threat detection and investigation with system-level provenance graphs: A survey. Comput Secur 2021;106:102282. [DOI: 10.1016/j.cose.2021.102282] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
Number Cited by Other Article(s)
1
Data Provenance for Cloud Forensic Investigations, Security, Challenges, Solutions and Future Perspectives: a survey. JOURNAL OF KING SAUD UNIVERSITY - COMPUTER AND INFORMATION SCIENCES 2022. [DOI: 10.1016/j.jksuci.2022.10.018] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/07/2022]
2
KRYSTAL: Knowledge graph-based framework for tactical attack discovery in audit data. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102828] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA