1. Advanced, 2020. persistent threat.
2. Intrusion Detection Systems: a Survey and Taxonomy;Axelsson,2000
3. Mining data provenance to detect advanced persistent threats;Barre,2019
4. A survey of data mining and machine learning methods for cyber security intrusion detection;Buczak;IEEE Commun. Surv. Tutor.,2016
5. Why and where: a characterization of data provenance;Buneman,2001