Author:
Tabiban Azadeh,Zhao Heyang,Jarraya Yosr,Pourzandi Makan,Zhang Mengyuan,Wang Lingyu
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Computational Experiment Comprehension using Provenance Summarization;Proceedings of the 2nd ACM Conference on Reproducibility and Replicability;2024-06-18
2. An Attack Entity Deducing Model for Attack Forensics;Communications in Computer and Information Science;2023-11-26
3. SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions;2023 IEEE Symposium on Security and Privacy (SP);2023-05
4. A Survey on Threat Hunting in Enterprise Networks;IEEE Communications Surveys & Tutorials;2023
5. On the Reproducibility of Bugs in File-System Aware Storage Applications;2022 IEEE International Conference on Networking, Architecture and Storage (NAS);2022-10