Secure Namespaced Kernel Audit for Containers | 0 | 0.34 | 2021 |
SIGL: Securing Software Installations Through Deep Graph Learning | 0 | 0.34 | 2021 |
Xanthus: Push-button Orchestration of Host Provenance Data Collection | 0 | 0.34 | 2020 |
UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats | 8 | 0.51 | 2020 |
Sharing and Preserving Computational Analyses for Posterity with encapsulator. | 1 | 0.36 | 2018 |
Runtime Analysis of Whole-System Provenance. | 6 | 0.43 | 2018 |
Provenance-based Intrusion Detection: Opportunities and Challenges. | 0 | 0.34 | 2018 |
FRAPpuccino: Fault-detection through Runtime Analysis of Provenance. | 2 | 0.41 | 2017 |
Automated debugging in data-intensive scalable computing. | 4 | 0.50 | 2017 |
Practical whole-system provenance capture. | 8 | 0.54 | 2017 |
Interactive Debugging for Big Data Analytics. | 4 | 0.43 | 2016 |