Research Article

LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering

Figure 5

Subgraphs of BPGs to illustrate the importance of node label.