Goyal, Akul, Wang, Gang, and Bates, Adam. R-CAID: Embedding Root Cause Analysis within Provenance-based Intrusion Detection. Retrieved from https://par.nsf.gov/biblio/10530808.
Goyal, Akul, Wang, Gang, & Bates, Adam. R-CAID: Embedding Root Cause Analysis within Provenance-based Intrusion Detection. Retrieved from https://par.nsf.gov/biblio/10530808.
Goyal, Akul, Wang, Gang, and Bates, Adam.
"R-CAID: Embedding Root Cause Analysis within Provenance-based Intrusion Detection". Country unknown/Code not available: Proceedings of The 45th IEEE Symposium on Security and Privacy (IEEE SP). https://par.nsf.gov/biblio/10530808.
@article{osti_10530808,
place = {Country unknown/Code not available},
title = {R-CAID: Embedding Root Cause Analysis within Provenance-based Intrusion Detection},
url = {https://par.nsf.gov/biblio/10530808},
abstractNote = {},
journal = {},
publisher = {Proceedings of The 45th IEEE Symposium on Security and Privacy (IEEE SP)},
author = {Goyal, Akul and Wang, Gang and Bates, Adam},
}
Warning: Leaving National Science Foundation Website
You are now leaving the National Science Foundation website to go to a non-government website.
Website:
NSF takes no responsibility for and exercises no control over the views expressed or the accuracy of
the information contained on this site. Also be aware that NSF's privacy policy does not apply to this site.