News

In recent years, provenance graph-based methods have gained widespread usage in system threat detection. However, the sheer volume of data within system logs poses significant challenges for the ...