Cited By
View all- Goyal AWang GBates A(2024)R-CAID: Embedding Root Cause Analysis within Provenance-based Intrusion Detection2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00253(3515-3532)Online publication date: 19-May-2024
- Mundt MBaier H(2024)Enhancing Incident Management by an Improved Understanding of Data Exfiltration: Definition, Evaluation, ReviewDigital Forensics and Cyber Crime10.1007/978-3-031-56580-9_3(33-57)Online publication date: 3-Apr-2024
- Chang BZhou FWang ZWen YZhang B(2023)A Distributed Storage System for System Logs Based on Hybrid Compression Scheme2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00127(724-735)Online publication date: 21-Dec-2023