
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation
Zhiqiang Xu, Pengcheng Fang, Changlin Liu, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2022), pp. 540-557
Closed Access | Times Cited: 34
Zhiqiang Xu, Pengcheng Fang, Changlin Liu, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2022), pp. 540-557
Closed Access | Times Cited: 34
Showing 1-25 of 34 citing articles:
Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance
Zijun Cheng, Qiujian Lv, Jinyuan Liang, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024) Vol. abs/2203.09258, pp. 3533-3551
Closed Access | Times Cited: 11
Zijun Cheng, Qiujian Lv, Jinyuan Liang, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024) Vol. abs/2203.09258, pp. 3533-3551
Closed Access | Times Cited: 11
Combating Advanced Persistent Threats: Challenges and Solutions
Yuntao Wang, Han Liu, Zhendong Li, et al.
IEEE Network (2024) Vol. 38, Iss. 6, pp. 324-333
Open Access | Times Cited: 7
Yuntao Wang, Han Liu, Zhendong Li, et al.
IEEE Network (2024) Vol. 38, Iss. 6, pp. 324-333
Open Access | Times Cited: 7
SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions
Muhammad Adil Inam, Chen Yin-fang, Akul Goyal, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2023), pp. 2620-2638
Closed Access | Times Cited: 14
Muhammad Adil Inam, Chen Yin-fang, Akul Goyal, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2023), pp. 2620-2638
Closed Access | Times Cited: 14
Semantic Web-Driven Unsupervised Detection of APT Attacks in Network Traffic Using Enhanced DBSCAN++ and aiNet
Kun Yuan, Zhiqiang Xia, Yongquan Shi
International Journal on Semantic Web and Information Systems (2025) Vol. 21, Iss. 1, pp. 1-31
Open Access
Kun Yuan, Zhiqiang Xia, Yongquan Shi
International Journal on Semantic Web and Information Systems (2025) Vol. 21, Iss. 1, pp. 1-31
Open Access
Jbeil: Temporal Graph-Based Inductive Learning to Infer Lateral Movement in Evolving Enterprise Networks
Joseph Khoury, Đorđe Klisura, Hadi Zanddizari, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024) Vol. 31, pp. 3644-3660
Closed Access | Times Cited: 4
Joseph Khoury, Đorđe Klisura, Hadi Zanddizari, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024) Vol. 31, pp. 3644-3660
Closed Access | Times Cited: 4
TaintAttack: rapid attack investigation based on information flow tracking
Yuedong Pan, Lixin Zhao, Tao Leng, et al.
The Computer Journal (2025)
Closed Access
Yuedong Pan, Lixin Zhao, Tao Leng, et al.
The Computer Journal (2025)
Closed Access
Flash: A Comprehensive Approach to Intrusion Detection via Provenance Graph Representation Learning
M. U. Rehman, Hadi Ahmadi, Wajih Ul Hassan
2022 IEEE Symposium on Security and Privacy (SP) (2024) Vol. 2, pp. 3552-3570
Closed Access | Times Cited: 3
M. U. Rehman, Hadi Ahmadi, Wajih Ul Hassan
2022 IEEE Symposium on Security and Privacy (SP) (2024) Vol. 2, pp. 3552-3570
Closed Access | Times Cited: 3
Detecting APT-Exploited Processes through Semantic Fusion and Interaction Prediction
Bin Luo, Liangguo Chen, Shuhua Ruan, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 2, pp. 1731-1754
Open Access | Times Cited: 2
Bin Luo, Liangguo Chen, Shuhua Ruan, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 2, pp. 1731-1754
Open Access | Times Cited: 2
ProcSAGE: an efficient host threat detection method based on graph representation learning
Boyuan Xu, Yiru Gong, Xiaoyu Geng, et al.
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 2
Boyuan Xu, Yiru Gong, Xiaoyu Geng, et al.
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 2
eAudit: A Fast, Scalable and Deployable Audit Data Collection System*
R. Sekar, Hanke Kimm, Rohit Aich
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 3571-3589
Closed Access | Times Cited: 2
R. Sekar, Hanke Kimm, Rohit Aich
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 3571-3589
Closed Access | Times Cited: 2
Cong Wu, Jing Chen, Ziming Zhao, et al.
(2024), pp. 956-970
Open Access | Times Cited: 2
TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning
Mingqi Lv, Hongzhe Gao, Xuebo Qiu, et al.
(2024), pp. 139-152
Open Access | Times Cited: 1
Mingqi Lv, Hongzhe Gao, Xuebo Qiu, et al.
(2024), pp. 139-152
Open Access | Times Cited: 1
Deepro: Provenance-based APT Campaigns Detection via GNN
Na Yan, Wen Yu, Luyao Chen, et al.
(2022)
Closed Access | Times Cited: 6
Na Yan, Wen Yu, Luyao Chen, et al.
(2022)
Closed Access | Times Cited: 6
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools
Feng Dong, Shaofei Li, Peng Jiang, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2023), pp. 2396-2410
Open Access | Times Cited: 3
Feng Dong, Shaofei Li, Peng Jiang, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2023), pp. 2396-2410
Open Access | Times Cited: 3
Obfuscating Provenance-Based Forensic Investigations with Mapping System Meta-Behavior
Anyuan Sang, Yuchen Wang, Li Yang, et al.
(2024) Vol. 18, pp. 248-262
Closed Access
Anyuan Sang, Yuchen Wang, Li Yang, et al.
(2024) Vol. 18, pp. 248-262
Closed Access
AudiTrim: A Real-time, General, Efficient, and Low-overhead Data Compaction System for Intrusion Detection
Sun Hong-bin, Su Wang, Zhiliang Wang, et al.
(2024), pp. 263-277
Closed Access
Sun Hong-bin, Su Wang, Zhiliang Wang, et al.
(2024), pp. 263-277
Closed Access
Log2Graph: A graph convolution neural network based method for insider threat detection
Kexiong Fei, Jiang Zhou, Lin Su, et al.
Journal of Computer Security (2024), pp. 1-24
Closed Access
Kexiong Fei, Jiang Zhou, Lin Su, et al.
Journal of Computer Security (2024), pp. 1-24
Closed Access
TRACEGADGET: Detecting and Tracing Network Level Attack Through Federal Provenance Graph
Han Liu, Yuntao Wang, Zhou Su, et al.
ICC 2022 - IEEE International Conference on Communications (2024), pp. 2713-2718
Closed Access
Han Liu, Yuntao Wang, Zhou Su, et al.
ICC 2022 - IEEE International Conference on Communications (2024), pp. 2713-2718
Closed Access
Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics
Jiacen Xu, Xiaokui Shu, Zhou Li
2022 IEEE Symposium on Security and Privacy (SP) (2024) Vol. 32, pp. 3590-3608
Closed Access
Jiacen Xu, Xiaokui Shu, Zhou Li
2022 IEEE Symposium on Security and Privacy (SP) (2024) Vol. 32, pp. 3590-3608
Closed Access
TurboLog: A Turbocharged Lossless Compression Method for System Logs via Transformer
Baoming Chang, Zhaoyang Wang, Shuai Li, et al.
2022 International Joint Conference on Neural Networks (IJCNN) (2024), pp. 1-10
Closed Access
Baoming Chang, Zhaoyang Wang, Shuai Li, et al.
2022 International Joint Conference on Neural Networks (IJCNN) (2024), pp. 1-10
Closed Access
A Survey on Advanced Persistent Threat Detection: A Unified Framework, Challenges, and Countermeasures
Bo Zhang, Yansong Gao, Boyu Kuang, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 3, pp. 1-36
Open Access
Bo Zhang, Yansong Gao, Boyu Kuang, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 3, pp. 1-36
Open Access
BehaMiner: System Behavior Mining for Audit Log Based on Graph Learning
Xiu Ma, Xiaoze Liu, Ce Li, et al.
Lecture notes in computer science (2024), pp. 333-346
Closed Access
Xiu Ma, Xiaoze Liu, Ce Li, et al.
Lecture notes in computer science (2024), pp. 333-346
Closed Access
Towards autonomous device protection using behavioural profiling and generative artificial intelligence
Sandeep Gupta, Bruno Crispo
IET Cyber-Physical Systems Theory & Applications (2024) Vol. 10, Iss. 1
Open Access
Sandeep Gupta, Bruno Crispo
IET Cyber-Physical Systems Theory & Applications (2024) Vol. 10, Iss. 1
Open Access
Combating Advanced Persistent Threats: Challenges and Solutions
Yuntao Wang, Han Liu, Zhou Su
arXiv (Cornell University) (2023)
Open Access | Times Cited: 1
Yuntao Wang, Han Liu, Zhou Su
arXiv (Cornell University) (2023)
Open Access | Times Cited: 1
Laaeb a Comprehensive Log-Text Analysis Based Approach for Insider Threat Detection
Kexiong Fei, Zhou Jiang, Yucan Zhou, et al.
(2023)
Closed Access | Times Cited: 1
Kexiong Fei, Zhou Jiang, Yucan Zhou, et al.
(2023)
Closed Access | Times Cited: 1