Author:
Zhang Tianming,Cai Xinwei,Chen Lu,Yang Zhengyi,Gao Yunjun,Cao Bin,Fan Jing
Funder
National Natural Science Foundation of China
Natural Science Foundation of Zhejiang Province of China
Key Research Project of Zhejiang Province of China
Publisher
Springer Science and Business Media LLC
Reference49 articles.
1. Mushlin, R.A., Kershenbaum, A., Gallagher, S.T., Rebbeck, T.R.: A graph-theoretical approach for pattern discovery in epidemiological research. IBM Syst. J. 46(1), 135–150 (2007)
2. Milajerdi, S.M., Eshete, B., Gjomemo, R., Venkatakrishnan, V.N.: POIROT: aligning attack behavior with kernel audit records for cyber threat hunting. In: CCS, pp. 1813–1830 (2019)
3. Li, Z., Chen, Q.A., Yang, R., Chen, Y., Ruan, W.: Threat detection and investigation with system-level provenance graphs: A survey. Comput. Secur. 106, 102282 (2021)
4. Cheng, Q., Shen, Y., Kong, D., Wu, C.: STEP: spatial-temporal network security event prediction. CoRR abs/2105.14932 (2021)
5. Mouden, Z.A.E., Taj, R.M., Jakimi, A., Hajar, M.: Towards using graph analytics for tracking covid-19. In: The 11th international conference on emerging ubiquitous systems and pervasive networks EUSPN, pp. 204–211 (2020)