Cyber-security analysts face an increasingly large number of alerts rece...
In recent years, enterprises have been targeted by advanced adversaries ...
With the rapid emergence of graph representation learning, the construct...
We develop a real-time anomaly detection algorithm for directed activity...