An end-to-end system that utilizes representation learning on provenance graph in order to detect the compromised hosts and users.
An end-to-end system that utilizes representation learning on provenance graph in order to detect the compromised hosts and users.
GNU General Public License v3.0