Author:
Thalheim Jorg,Bhatotia Pramod,Fetzer Christof
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. ProvG-Searcher: A Graph Representation Learning Approach for Efficient Provenance Graph Search;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
2. SingAll: Scalable Control Flow Checking for Multi-Process Embedded Systems;2023 13th International Conference on Computer and Knowledge Engineering (ICCKE);2023-11-01
3. SmallRace: Static Race Detection for Dynamic Languages - A Case on Smalltalk;2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE);2023-05
4. Provenance-based Intrusion Detection Systems: A Survey;ACM Computing Surveys;2022-12-15
5. SEEKER: A Root Cause Analysis Method Based on Deterministic Replay for Multi-Type Network Protocol Vulnerabilities;2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2022-12