The following publications are possibly variants of this publication:
- Provenance-based APT campaigns detection via masked graph representation learningJiafeng Ren, Rong Geng. compsec, 148:104159, 2025. [doi]
- Gs-Ocsvm: an APT attack detection method based on provenance graphHuixue Liu, Xinqian Liu, Chuan Zhao, Jianguo Ding. tjs, 81(15):1443, October 2025. [doi]
- LLM-Driven APT Analysis and Detection Based on Provenance Graph by Threat PatternYibin Fu, Zhaoyun Ding, Sheng Zhang, Deqi Cao, Yi Wang. trustcom 2025: 524-531 [doi]
- PDCleaner: A multi-view collaborative data compression method for provenance graph-based APT detection systemsJiaobo Jin, Tiantian Zhu, Qixuan Yuan, Tieming Chen, Mingqi Lv, Chenbin Zheng, Jian-Ping Mei, Xiang Pan. compsec, 152:104359, 2025. [doi]
- A Real-time APT Attack Detection Scheme Based on Fusion Provenance Graph in Private CloudsHan Li, Chuanwei Yang, Baitong Zha, Lifan Liu, Zhiwei Zhang, Shuo Zhong. nana 2024: 490-495 [doi]