LENG, T., CAI, L., YU, A., ZHU, Z., MA, J., LI, C., . . . MENG, D. Review of threat discovery and forensic analysis based on system provenance graph. Editorial Department of Journal on Communications.
Chicago Style (17th ed.) CitationLENG, Tao, Lijun CAI, Aimin YU, Ziyuan ZHU, Jian’gang MA, Chaofei LI, Ruicheng NIU, and Dan MENG. Review of Threat Discovery and Forensic Analysis Based on System Provenance Graph. Editorial Department of Journal on Communications.
MLA (9th ed.) CitationLENG, Tao, et al. Review of Threat Discovery and Forensic Analysis Based on System Provenance Graph. Editorial Department of Journal on Communications.
Warning: These citations may not always be 100% accurate.