作者: Adel Alshamrani , Sowmya Myneni , Ankur Chowdhary , Dijiang Huang
DOI: 10.1109/COMST.2019.2891891
关键词: Computer science 、 Malware 、 Intrusion detection system 、 Research opportunities 、 Computer security 、 Mitigation methods 、 Advanced persistent threat 、 Class (computer programming) 、 Sophistication 、 Control (management)
摘要: … relation and fine-grained behavior analysis of users and systems within … These are rising threats to many nation entities and … an undirected graph where nodes of the graph represent the …