1. Ahmad, R., Jung, E., de Senne Garcia, C., Irshad, H., Gehani, A.: Discrepancy detection in whole-network provenance. In: Proceedings of the Twelfth USENIX Conference on Theory and Practice of Provenance, article no. 5 (2020)
2. Berrada, G., et al.: A baseline for unsupervised advanced persistent threat detection in system-level provenance. Futur. Gener. Comput. Syst. 108, 401–413 (2020)
3. Catlett, C.: The philosophy of TeraGrid: building an open, extensible, distributed terascale facility. In: Proceedings of the Second IEEE/ACM International Symposium on Cluster Computing and the Grid (2002)
4. Cheney, J.: A formal framework for provenance security. In: Proceedings of the Twenty-Fourth IEEE Computer Security Foundations Symposium, pp. 281–293 (2011)
5. Defense Advanced Reseach Projects Agency, Transparent Computing (archived), Arlington, Virginia (darpa.mil/program/transparent-computing) (2023)