Provenance-based intrusion detection
Complex heterogeneous dynamic networks, such as knowledge graphs, are important constructions for simulating the records of data modification, access and usage in computer systems. In this project we investigated the analysis of these graphs and the tracing of their pattern to uncover cyber security...
Saved in:
Main Author: | Ng, Joel Soon En |
---|---|
Other Authors: | Ke Yiping, Kelly |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/162948 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Provenance-based intrusion detection
by: Lim, Qian Hui
Published: (2023) -
Provenance graph generation for intrusion detection
by: Jabir Shah Halith
Published: (2022) -
Provenance graph generation for intrusion detection
by: Chong, Wai Mun
Published: (2023) -
Provenance-based intrusion detection
by: Ong, Benjamin Chee Meng
Published: (2024) -
Provenance graph generation for intrusion detection
by: Chew, Perlyn Jie Ying
Published: (2023)