Login / Signup

An end-to-end method for advanced persistent threats reconstruction in large-scale networks based on alert and log correlation.

Yifeng WangYuanbo GuoChen Fang
Published in: J. Inf. Secur. Appl. (2022)
Keyphrases
  • end to end
  • high resolution