Abstract: Detecting advanced persistent threats (APTs) at a host via data provenance has emerged as a valuable yet challenging task. Compared with attack rule matching, machine learning approaches ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results