1. Holmes: real-time apt detection through correlation of suspicious information flows;Milajerdi,2019
2. TRACE: Enterprise-wide provenance tracking for real-time APT detection;Irshad;IEEE Trans. Inf. Forensics Secur.,2021
3. Multi-stage attack detection via kill chain state machines;Wilkens,2021
4. A survey of outlier detection methodologies;Hodge;Artif. Intell. Rev.,2004
5. Network anomaly detection: methods, systems and tools;Bhuyan;IEEE Commun. Surv. Tutor.,2013