All Stories

  1. A survey on host-based intrusion detection systems which utilize data provenance