Visible to the public Sleuth: Real-Time Attack Campaign Reconstruction Using Tag-Based Analysis of Main-Memory Provenance Graphs

License: 
Creative Commons 2.5