共 50 条
- [1] Understanding Data Science Lifecycle Provenance via Graph Segmentation and Summarization [J]. 2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019), 2019, : 1710 - 1713
- [2] Understanding Ethereum via Graph Analysis [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1484 - 1492
- [4] Quine: A Temporal Graph System for Provenance Storage and Analysis [J]. PROVENANCE AND ANNOTATION OF DATA AND PROCESSES, IPAW 2018, 2018, 11017 : 177 - 180
- [5] Ransomware behavior attack construction via graph theory approach [J]. International Journal of Advanced Computer Science and Applications, 2020, (02): : 487 - 496
- [7] Review of threat discovery and forensic analysis based on system provenance graph [J]. Tongxin Xuebao/Journal on Communications, 2022, 43 (07): : 172 - 188
- [8] Visual Causality: Investigating Graph Layouts for Understanding Causal Processes [J]. DIAGRAMMATIC REPRESENTATION AND INFERENCE, DIAGRAMS 2020, 2020, 12169 : 332 - 347
- [9] Obscuring Provenance Confidential Information via Graph Transformation [J]. TRUST MANAGEMENT IX, 2015, 454 : 109 - 125
- [10] CTSCOPY: Hunting Cyber Threats within Enterprise via Provenance Graph-based Analysis [J]. 2021 IEEE 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2021), 2021, : 28 - 39