1. King, S.T., Chen, P.M.: Backtracking intrusions. In: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, pp. 223–236 (2003)
2. Wajih Ul, H., et al.: Nodoze: combatting threat alert fatigue with automated provenance triage. In: Network and Distributed Systems Security Symposium (2019)
3. Fang, P., et al.: Back-propagating: system dependency impact for attack investigation. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 2461–2478 (2022)
4. Zuech, R., Khoshgoftaar, T.M., Wald, R.: Intrusion detection and big heterogeneous data: a survey. J. Big Data. 2(1), 1–41 (2015)
5. Hossain, N., Milajerdi, S.M., Wang, J.: SLEUTH: Real-time attack scenario reconstruction from COTS audit data. In: USENIX Security Symposium, pp. 487–504 (2017)