Sleuth: Real-Time Attack Campaign Reconstruction Using Tag-Based Analysis of Main-Memory Provenance Graphs
License:
Creative Commons 2.5 PDF document
- 13.79 MB
- 5 downloads
- Download
- PDF version
- Printer-friendly version