ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2006.01722
  4. Cited By
Threat Detection and Investigation with System-level Provenance Graphs:
  A Survey
v1v2v3 (latest)

Threat Detection and Investigation with System-level Provenance Graphs: A Survey

2 June 2020
Zhenyuan Li
Qi Alfred Chen
Runqing Yang
Yan Chen
ArXiv (abs)PDFHTML

Papers citing "Threat Detection and Investigation with System-level Provenance Graphs: A Survey"

18 / 18 papers shown
Title
Few-Shot Learning-Based Cyber Incident Detection with Augmented Context Intelligence
Few-Shot Learning-Based Cyber Incident Detection with Augmented Context Intelligence
Fei Zuo
Junghwan Rhee
Yung Ryn Choe
Chenglong Fu
Xianshan Qu
AAML
22
0
0
19 Jun 2025
Lightweight and High-Throughput Secure Logging for Internet of Things and Cold Cloud Continuum
Saif E. Nouma
Attila A Yavuz
17
0
0
10 Jun 2025
Deep Learning-based Intrusion Detection Systems: A Survey
Deep Learning-based Intrusion Detection Systems: A Survey
Zhiwei Xu
Yujuan Wu
Shiheng Wang
Jiabao Gao
Tian Qiu
Ziqi Wang
Hai Wan
Xibin Zhao
67
3
0
10 Apr 2025
Knowledge Transfer from LLMs to Provenance Analysis: A Semantic-Augmented Method for APT Detection
Knowledge Transfer from LLMs to Provenance Analysis: A Semantic-Augmented Method for APT Detection
Fei Zuo
Junghwan Rhee
Yung Ryn Choe
108
1
0
24 Mar 2025
Exploring Answer Set Programming for Provenance Graph-Based Cyber Threat Detection: A Novel Approach
Exploring Answer Set Programming for Provenance Graph-Based Cyber Threat Detection: A Novel Approach
Fang Li
Fei Zuo
Gopal Gupta
55
0
0
24 Jan 2025
TFLAG:Towards Practical APT Detection via Deviation-Aware Learning on Temporal Provenance Graph
TFLAG:Towards Practical APT Detection via Deviation-Aware Learning on Temporal Provenance Graph
Wenhan Jiang
Tingting Chai
Hongri Liu
Kai Wang
Hongke Zhang
85
0
0
13 Jan 2025
LESS: Efficient Log Storage System Based on Learned Model and Minimum
  Attribute Tree
LESS: Efficient Log Storage System Based on Learned Model and Minimum Attribute Tree
Zhiyang Cheng
Zizhen Zhu
Haoran Dang
Hai Wan
Xibin Zhao
76
0
0
26 Nov 2024
Winemaking: Extracting Essential Insights for Efficient Threat Detection
  in Audit Logs
Winemaking: Extracting Essential Insights for Efficient Threat Detection in Audit Logs
Weiheng Wu
Wei Qiao
Wenhao Yan
Bo-Sian Jiang
Yuling Liu
Baoxu Liu
Zhigang Lu
JunRong Liu
64
0
0
05 Nov 2024
Incorporating Gradients to Rules: Towards Lightweight, Adaptive
  Provenance-based Intrusion Detection
Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection
Lingzhi Wang
Xiangmin Shen
Weijian Li
Zhenyuan Li
R. Sekar
Han Liu
Yan Chen
AAML
71
1
0
23 Apr 2024
LTRDetector: Exploring Long-Term Relationship for Advanced Persistent
  Threats Detection
LTRDetector: Exploring Long-Term Relationship for Advanced Persistent Threats Detection
Xiaoxiao Liu
Fan Xu
Nan Wang
Qinxin Zhao
Dalin Zhang
Xibin Zhao
Jiqiang Liu
93
0
0
04 Apr 2024
TREC: APT Tactic / Technique Recognition via Few-Shot Provenance
  Subgraph Learning
TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning
Mingqi Lv
HongZhe Gao
Xuebo Qiu
Tieming Chen
Tiantian Zhu
66
3
0
23 Feb 2024
Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis
  of EDR Performance in Real-World Environments
Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments
Xiangmin Shen
Zhenyuan Li
Graham Burleigh
Lingzhi Wang
Yan Chen
48
3
0
29 Jan 2024
You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise
  Networks
You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks
Rafael Uetz
Marco Herzog
Louis Hackländer
Simon Schwarz
Martin Henze
AAML
62
3
0
16 Nov 2023
Towards Data-centric Graph Machine Learning: Review and Outlook
Towards Data-centric Graph Machine Learning: Review and Outlook
Xin Zheng
Yixin Liu
Zhifeng Bao
Meng Fang
Xia Hu
Alan Wee-Chung Liew
Shirui Pan
GNNAI4CE
102
20
0
20 Sep 2023
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint
  Detection and Response Tools
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools
Feng Dong
Shaofei Li
Peng Jiang
Ding Li
Haoyu Wang
...
Xusheng Xiao
Jiedong Chen
Xiapu Luo
Yao Guo
Xiangqun Chen
41
25
0
17 Jul 2023
Exploration of Enterprise Server Data to Assess Ease of Modeling System
  Behavior
Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior
Enes Altinisik
Husrev Taha Sencar
Mohamed Nabeel
Issa M. Khalil
Tingyue Yu
45
0
0
12 Jun 2022
APTSHIELD: A Stable, Efficient and Real-time APT Detection System for
  Linux Hosts
APTSHIELD: A Stable, Efficient and Real-time APT Detection System for Linux Hosts
Tiantian Zhu
Jinkai Yu
Tieming Chen
Qixuan Yuan
J. Ying
Jiabo Zhang
Mingqi Lv
Yan Chen
Yuan Fan
Ting Wang
50
28
0
16 Dec 2021
Research trends, challenges, and emerging topics of digital forensics: A
  review of reviews
Research trends, challenges, and emerging topics of digital forensics: A review of reviews
Fran Casino
Thomas K. Dasaklis
G. Spathoulas
M. Anagnostopoulos
Amrita Ghosal
István Bor̈oc̈z
A. Solanas
Mauro Conti
Constantinos Patsakis
81
85
0
10 Aug 2021
1