Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2006.01722
Cited By
v1
v2
v3 (latest)
Threat Detection and Investigation with System-level Provenance Graphs: A Survey
2 June 2020
Zhenyuan Li
Qi Alfred Chen
Runqing Yang
Yan Chen
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Threat Detection and Investigation with System-level Provenance Graphs: A Survey"
18 / 18 papers shown
Title
Few-Shot Learning-Based Cyber Incident Detection with Augmented Context Intelligence
Fei Zuo
Junghwan Rhee
Yung Ryn Choe
Chenglong Fu
Xianshan Qu
AAML
22
0
0
19 Jun 2025
Lightweight and High-Throughput Secure Logging for Internet of Things and Cold Cloud Continuum
Saif E. Nouma
Attila A Yavuz
17
0
0
10 Jun 2025
Deep Learning-based Intrusion Detection Systems: A Survey
Zhiwei Xu
Yujuan Wu
Shiheng Wang
Jiabao Gao
Tian Qiu
Ziqi Wang
Hai Wan
Xibin Zhao
67
3
0
10 Apr 2025
Knowledge Transfer from LLMs to Provenance Analysis: A Semantic-Augmented Method for APT Detection
Fei Zuo
Junghwan Rhee
Yung Ryn Choe
108
1
0
24 Mar 2025
Exploring Answer Set Programming for Provenance Graph-Based Cyber Threat Detection: A Novel Approach
Fang Li
Fei Zuo
Gopal Gupta
55
0
0
24 Jan 2025
TFLAG:Towards Practical APT Detection via Deviation-Aware Learning on Temporal Provenance Graph
Wenhan Jiang
Tingting Chai
Hongri Liu
Kai Wang
Hongke Zhang
85
0
0
13 Jan 2025
LESS: Efficient Log Storage System Based on Learned Model and Minimum Attribute Tree
Zhiyang Cheng
Zizhen Zhu
Haoran Dang
Hai Wan
Xibin Zhao
76
0
0
26 Nov 2024
Winemaking: Extracting Essential Insights for Efficient Threat Detection in Audit Logs
Weiheng Wu
Wei Qiao
Wenhao Yan
Bo-Sian Jiang
Yuling Liu
Baoxu Liu
Zhigang Lu
JunRong Liu
64
0
0
05 Nov 2024
Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection
Lingzhi Wang
Xiangmin Shen
Weijian Li
Zhenyuan Li
R. Sekar
Han Liu
Yan Chen
AAML
71
1
0
23 Apr 2024
LTRDetector: Exploring Long-Term Relationship for Advanced Persistent Threats Detection
Xiaoxiao Liu
Fan Xu
Nan Wang
Qinxin Zhao
Dalin Zhang
Xibin Zhao
Jiqiang Liu
93
0
0
04 Apr 2024
TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning
Mingqi Lv
HongZhe Gao
Xuebo Qiu
Tieming Chen
Tiantian Zhu
66
3
0
23 Feb 2024
Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments
Xiangmin Shen
Zhenyuan Li
Graham Burleigh
Lingzhi Wang
Yan Chen
48
3
0
29 Jan 2024
You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks
Rafael Uetz
Marco Herzog
Louis Hackländer
Simon Schwarz
Martin Henze
AAML
62
3
0
16 Nov 2023
Towards Data-centric Graph Machine Learning: Review and Outlook
Xin Zheng
Yixin Liu
Zhifeng Bao
Meng Fang
Xia Hu
Alan Wee-Chung Liew
Shirui Pan
GNN
AI4CE
102
20
0
20 Sep 2023
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools
Feng Dong
Shaofei Li
Peng Jiang
Ding Li
Haoyu Wang
...
Xusheng Xiao
Jiedong Chen
Xiapu Luo
Yao Guo
Xiangqun Chen
41
25
0
17 Jul 2023
Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior
Enes Altinisik
Husrev Taha Sencar
Mohamed Nabeel
Issa M. Khalil
Tingyue Yu
45
0
0
12 Jun 2022
APTSHIELD: A Stable, Efficient and Real-time APT Detection System for Linux Hosts
Tiantian Zhu
Jinkai Yu
Tieming Chen
Qixuan Yuan
J. Ying
Jiabo Zhang
Mingqi Lv
Yan Chen
Yuan Fan
Ting Wang
50
28
0
16 Dec 2021
Research trends, challenges, and emerging topics of digital forensics: A review of reviews
Fran Casino
Thomas K. Dasaklis
G. Spathoulas
M. Anagnostopoulos
Amrita Ghosal
István Bor̈oc̈z
A. Solanas
Mauro Conti
Constantinos Patsakis
81
85
0
10 Aug 2021
1