JS Wu,
YJ Lee, TE Wei, CH Hsieh… - 2016 IEEE Trustcom …, 2016 - ieeexplore.ieee.org
Given service logs of who used what service, and when, how can we find intrusions and
anomalies? In this paper, a cyber threat detection framework-ChainSpot was proposed, in …