Skip to content

Endcat/apt-provenance-research

Repository files navigation

apt-provenance-research

Material collections for APT provenance research

Future update on: https://endcat.cn/kanna/index.php/tag/essay/

Intro

This repo used for my university study research on APT provenance.

Some article & code would be saved as archives in this repo.

Articles (cited by MLA)

  • Kimura, Tatsuaki, et al. "Spatio-temporal factorization of log data for understanding network events." IEEE INFOCOM 2014-IEEE Conference on Computer Communications. IEEE, 2014.
  • Pei, Kexin, et al. "Hercule: Attack story reconstruction via community discovery on correlated log graph." Proceedings of the 32Nd Annual Conference on Computer Security Applications. 2016.
  • 邹本友, et al. "基于用户信任和张量分解的社会网络推荐." 软件学报 25.12 (2014): 2852-2864.
  • Du, Min, and Feifei Li. "Spell: Online streaming parsing of large unstructured system logs." IEEE Transactions on Knowledge and Data Engineering 31.11 (2018): 2213-2227.
  • Lee, Daniel D., and H. Sebastian Seung. "Learning the parts of objects by non-negative matrix factorization." Nature 401.6755 (1999): 788-791.
  • Cichocki, Andrzej, Rafal Zdunek, and Shun-ichi Amari. "Nonnegative matrix and tensor factorization [lecture notes]." IEEE signal processing magazine 25.1 (2007): 142-145.
  • Que, Xinyu, et al. "Scalable community detection with the louvain algorithm." 2015 IEEE International Parallel and Distributed Processing Symposium. IEEE, 2015.

About

APT Provenance | 溯源方案的论文研究整理

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published