Login / Signup
THREATRACE: Detecting and Tracing Host-Based Threats in Node Level Through Provenance Graph Learning.
Su Wang
Zhiliang Wang
Tao Zhou
Hongbin Sun
Xia Yin
Dongqi Han
Han Zhang
Xingang Shi
Jiahai Yang
Published in:
IEEE Trans. Inf. Forensics Secur. (2022)
Keyphrases
</>
metadata
learning process
active learning
knowledge acquisition
learning tasks
learning algorithm
directed graph
prior knowledge
random walk
structured data
neural network
e learning
supervised learning
online learning
unsupervised learning
learning systems