Abstract: With the rapid development of artificial intelligence and a new generation of network technologies, the Internet of Things (IoT) is expanding worldwide. Malicious agents consistently exploit ...
Abstract: Provenance graphs are structured audit logs that describe the history of a system’s execution. Recent studies have explored a variety of techniques to analyze provenance graphs for automated ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results