Author:
Suryavanshi Rajani,Sun Xiaoyan,Dai Jun
Publisher
Springer Nature Switzerland
Reference28 articles.
1. P. Ammann, D. Wijesekera and S. Kaushik, Scalable graph-based network vulnerability analysis, Proceedings of the Ninth ACM Conference on Computer and Communications Security, pp. 217–224, 2002.
2. A. Bates, D. Tian, K. Butler and T. Moyer, Trustworthy whole-system provenance for the Linux kernel, Proceedings of the Twenty-Fourth USENIX Security Symposium, pp. 319–334, 2015.
3. U. Braun, S. Garfinkel, D. Holland, K. Muniswamy-Reddy and M. Seltzer, Issues in automatic provenance collection, in Provenance and Annotation of Data, L. Moreau and I. Foster (Eds.), Springer, Berlin Heidelberg, Germany, pp. 171–183, 2006.
4. J. Dai, X. Sun and P. Liu, Patrol: Revealing zero-day attack paths through network-wide system object dependencies, Proceedings of the Eighteenth European Symposium on Research in Computer Security, pp. 536–555, 2013.
5. A. Gehani and D. Tariq, SPADE: Support for provenance auditing in distributed environments, Proceedings of the Thirteenth ACM/ IFIP/USENIX International Middleware Conference, pp. 101–120, 2012.