Research Article
SR2APT: A Detection and Strategic Alert Response Model against Multistage APT Attacks
Figure 1
Provenance graph of a sample trace of system logs. Nodes represent system entities. Arrows and labels on edges indicate the direction and type of relations between entities.