Sleuth: Real-Time Attack Campaign Reconstruction Using Tag-Based Analysis of Main-Memory Provenance Graphs

Namesort iconValue
MIME typeapplication/pdf
Size13.79 MB