Provenance graph generation for intrusion detection
In today’s rapidly evolving threat landscape, the demand for robust defense mechanisms against zero-day attacks and other unforeseeable threats is escalating. As threat actors continually innovate, traditional security approaches struggle to keep pace, necessitating the exploration of novel strategi...
Main Author: | Lim, Janesse Ziyi |
---|---|
Other Authors: | Ke Yiping, Kelly |
Format: | Final Year Project (FYP) |
Language: | English |
Published: |
Nanyang Technological University
2024
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/175398 |
Similar Items
-
Graph homophily unsupervised measurements
by: Nguyen, Hoang Minh
Published: (2024) -
Fake news detection through feature fusion: Leveraging RoBERTa and knowledge graphs with gating
by: Fang, Zhuohao
Published: (2024) -
Comment to U.S Copyright Office on Data Provenance and Copyright
by: Mahari, Robert, et al.
Published: (2024) -
Efficient and scalable processing of visual property graph queries
by: Wang, Tianyu
Published: (2024) -
Efficient algorithms for subgraph counting and enumeration on large graphs
by: Wang, Kaixin
Published: (2024)