Text this: Review of threat discovery and forensic analysis based on system provenance graph