Search papers, labs, and topics across Lattice.
1
0
2
Fusing node-centric and edge-centric views of system provenance graphs slashes false positives in intrusion detection, outperforming single-view methods on standard benchmarks.