{"id":"https://openalex.org/W4401864884","doi":"https://doi.org/10.1186/s42400-024-00240-w","title":"ProcSAGE: an efficient host threat detection method based on graph representation learning","display_name":"ProcSAGE: an efficient host threat detection method based on graph representation learning","publication_year":2024,"publication_date":"2024-08-25","ids":{"openalex":"https://openalex.org/W4401864884","doi":"https://doi.org/10.1186/s42400-024-00240-w"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-024-00240-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00240-w","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00240-w","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00240-w","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046509402","display_name":"Boyuan Xu","orcid":"https://orcid.org/0000-0002-7960-1970"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Boyuan Xu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Bejing, China","School of Cyber Security, University of Chinese Academy of Sciences, Bejing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Bejing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Bejing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111301052","display_name":"Yiru Gong","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiru Gong","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Bejing, China","School of Cyber Security, University of Chinese Academy of Sciences, Bejing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Bejing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Bejing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113348109","display_name":"Xiaoyu Geng","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyu Geng","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Bejing, China","School of Cyber Security, University of Chinese Academy of Sciences, Bejing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Bejing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Bejing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059462676","display_name":"Yunwei Li","orcid":"https://orcid.org/0000-0002-5410-4505"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yun Li","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Bejing, China","School of Cyber Security, University of Chinese Academy of Sciences, Bejing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Bejing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Bejing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054446049","display_name":"Cong Dong","orcid":"https://orcid.org/0000-0001-7581-7160"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cong Dong","raw_affiliation_strings":["Zhongguancun Laboratory, Bejing, China"],"affiliations":[{"raw_affiliation_string":"Zhongguancun Laboratory, Bejing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005144050","display_name":"Song Liu","orcid":"https://orcid.org/0000-0001-5812-8902"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Song Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Bejing, China","School of Cyber Security, University of Chinese Academy of Sciences, Bejing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Bejing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Bejing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031905258","display_name":"Yuling Liu","orcid":"https://orcid.org/0000-0002-2740-9362"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuling Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Bejing, China","School of Cyber Security, University of Chinese Academy of Sciences, Bejing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Bejing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Bejing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069409781","display_name":"Bo Jiang","orcid":"https://orcid.org/0000-0001-9446-8875"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Jiang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Bejing, China","School of Cyber Security, University of Chinese Academy of Sciences, Bejing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Bejing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Bejing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012305916","display_name":"Zhigang L\u00fc","orcid":"https://orcid.org/0000-0001-5102-6217"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhigang Lu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Bejing, China","School of Cyber Security, University of Chinese Academy of Sciences, Bejing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Bejing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Bejing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5046509402"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":2.4009,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.89487377,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"7","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7155536413192749},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.6424534916877747},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.6213414669036865},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.48450466990470886},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4009813964366913},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35108181834220886},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.17164018750190735},{"id":"https://openalex.org/keywords/genetics","display_name":"Genetics","score":0.057490259408950806}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7155536413192749},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.6424534916877747},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.6213414669036865},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.48450466990470886},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4009813964366913},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35108181834220886},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.17164018750190735},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.057490259408950806},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-024-00240-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00240-w","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00240-w","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f11da6db7ba044d8a99df1cee121261b","is_oa":true,"landing_page_url":"https://doaj.org/article/f11da6db7ba044d8a99df1cee121261b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 7, Iss 1, Pp 1-14 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-024-00240-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00240-w","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00240-w","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5,"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8"}],"awards":[{"id":"https://openalex.org/G214425067","display_name":null,"funder_award_id":"SG270000YXJS2311060","funder_id":"https://openalex.org/F4320335984","funder_display_name":"Science and Technology Foundation of State Grid Corporation of China"},{"id":"https://openalex.org/G3129173456","display_name":null,"funder_award_id":"2021156","funder_id":"https://openalex.org/F4320322847","funder_display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences"},{"id":"https://openalex.org/G3390532264","display_name":null,"funder_award_id":"XDC02040100","funder_id":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences"},{"id":"https://openalex.org/G3882980231","display_name":null,"funder_award_id":"2023YFC2206402","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5824097048","display_name":null,"funder_award_id":"2023YFC2206402","funder_id":"https://openalex.org/F4320335774","funder_display_name":"Key Technologies Research and Development Program"},{"id":"https://openalex.org/G5988057243","display_name":null,"funder_award_id":"2021156","funder_id":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences"},{"id":"https://openalex.org/G7630255846","display_name":null,"funder_award_id":"XDC02040100","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G7999632103","display_name":null,"funder_award_id":"2021156","funder_id":"https://openalex.org/F4320335892","funder_display_name":"Youth Innovation Promotion Association"},{"id":"https://openalex.org/G8058437614","display_name":null,"funder_award_id":"XDC02040100","funder_id":"https://openalex.org/F4320322847","funder_display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences"},{"id":"https://openalex.org/G8142091388","display_name":null,"funder_award_id":"2021156","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"},{"id":"https://openalex.org/F4320322847","display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","ror":"https://ror.org/031141b54"},{"id":"https://openalex.org/F4320326707","display_name":"State Grid Corporation of China","ror":"https://ror.org/05twwhs70"},{"id":"https://openalex.org/F4320335774","display_name":"Key Technologies Research and Development Program","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335892","display_name":"Youth Innovation Promotion Association","ror":null},{"id":"https://openalex.org/F4320335984","display_name":"Science and Technology Foundation of State Grid Corporation of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4401864884.pdf","grobid_xml":"https://content.openalex.org/works/W4401864884.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W2096347345","https://openalex.org/W2125735062","https://openalex.org/W2129860818","https://openalex.org/W2135143063","https://openalex.org/W2284900416","https://openalex.org/W2295705535","https://openalex.org/W2532844970","https://openalex.org/W2560810941","https://openalex.org/W2747669027","https://openalex.org/W2790557990","https://openalex.org/W2794988934","https://openalex.org/W2910711617","https://openalex.org/W2947745012","https://openalex.org/W2962703433","https://openalex.org/W2978956219","https://openalex.org/W2986944522","https://openalex.org/W2998038410","https://openalex.org/W3002573977","https://openalex.org/W3005127313","https://openalex.org/W3006711782","https://openalex.org/W3015650867","https://openalex.org/W3016038045","https://openalex.org/W3099203541","https://openalex.org/W3110889769","https://openalex.org/W3157720608","https://openalex.org/W3195954353","https://openalex.org/W3212868562","https://openalex.org/W4288057803","https://openalex.org/W4388858673","https://openalex.org/W6607262404"],"related_works":["https://openalex.org/W2117112636","https://openalex.org/W2001981265","https://openalex.org/W2062195135","https://openalex.org/W2014134454","https://openalex.org/W3165388193","https://openalex.org/W2371177456","https://openalex.org/W274046748","https://openalex.org/W1804953925","https://openalex.org/W4246303233","https://openalex.org/W2371478427"],"abstract_inverted_index":{"Abstract":[0],"Advanced":[1],"Persistent":[2],"Threats":[3],"(APTs)":[4],"achieves":[5],"internal":[6],"networks":[7],"penetration":[8],"through":[9,20],"multiple":[10],"methods,":[11],"making":[12],"it":[13],"difficult":[14],"to":[15,134,165,175],"detect":[16],"attack":[17,80],"clues":[18,81],"solely":[19],"boundary":[21],"defense":[22],"measures.":[23],"To":[24,91],"address":[25],"this":[26,93,95,183],"challenge,":[27],"some":[28],"research":[29],"has":[30],"proposed":[31],"threat":[32,211],"detection":[33,212],"methods":[34,56],"based":[35,104],"on":[36,105,121,189],"provenance":[37,140],"graphs,":[38],"which":[39,101],"leverage":[40],"entity":[41],"relationships":[42],"such":[43],"as":[44,225],"processes,":[45],"files,":[46],"and":[47,67,76,114,142,161,169,206,218],"sockets":[48],"found":[49],"in":[50,125,147,209],"host":[51,126],"audit":[52,65,85,127],"logs.":[53],"However,":[54],"these":[55],"are":[57],"generally":[58],"inefficient,":[59],"especially":[60],"when":[61],"faced":[62],"with":[63],"massive":[64,83],"logs":[66,86,128],"the":[68,98,130,137,148,156,177,180,190,198,204,210,216,219,226],"computational":[69],"resource-intensive":[70],"nature":[71],"of":[72,139,179],"graph":[73,131],"algorithms.":[74],"Effectively":[75],"economically":[77],"extracting":[78],"APT":[79],"from":[82,116],"system":[84],"remains":[87],"a":[88,186],"significant":[89,224],"challenge.":[90],"tackle":[92],"problem,":[94],"paper":[96],"introduces":[97],"ProcSAGE":[99,119,152,181,199],"method,":[100,182],"detects":[102],"threats":[103],"abnormal":[106],"behavior":[107],"patterns,":[108],"offering":[109],"high":[110],"accuracy,":[111,217],"low":[112],"cost,":[113],"independence":[115],"expert":[117],"knowledge.":[118],"focuses":[120],"processes":[122,157],"or":[123,158],"threads":[124,159],"during":[129],"construction":[132],"phase":[133],"effectively":[135],"control":[136],"scale":[138],"graphs":[141],"reduce":[143,203],"performance":[144],"overhead.":[145],"Additionally,":[146],"feature":[149],"extraction":[150],"phase,":[151],"considers":[153],"information":[154],"about":[155],"themselves":[160],"their":[162],"neighboring":[163],"nodes":[164],"accurately":[166],"characterize":[167],"them":[168],"enhance":[170],"model":[171],"accuracy.":[172],"In":[173],"order":[174],"verify":[176],"effectiveness":[178],"study":[184],"conducted":[185],"comprehensive":[187],"evaluation":[188],"StreamSpot":[191],"dataset.":[192],"The":[193],"experimental":[194],"results":[195],"show":[196],"that":[197],"method":[200],"can":[201],"significantly":[202],"time":[205],"memory":[207],"consumption":[208],"process":[213],"while":[214],"improving":[215],"optimization":[220],"effect":[221],"becomes":[222],"more":[223],"data":[227],"size":[228],"expands.":[229]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
