Li, J., Zhang, R., Liu, J., & Liu, G. (2022). LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering. Security and communication networks, 2022, 1-16. https://doi.org/10.1155/2022/4577141
Chicago Style (17th ed.) CitationLi, Jiawei, Ru Zhang, Jianyi Liu, and Gongshen Liu. "LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering." Security and Communication Networks 2022 (2022): 1-16. https://doi.org/10.1155/2022/4577141.
MLA (9th ed.) CitationLi, Jiawei, et al. "LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering." Security and Communication Networks, vol. 2022, 2022, pp. 1-16, https://doi.org/10.1155/2022/4577141.
Warning: These citations may not always be 100% accurate.