Graph Neural Network Based Adaptive Threat Detection for Cloud Identity and Access Management Logs Authors: Venkata Tanuja Madireddy | Published: 2025-12-11 グラフ分析Trigger Detection行動分析手法 2025.12.11 2025.12.13 Literature Database
ART: A Graph-based Framework for Investigating Illicit Activity in Monero via Address-Ring-Transaction Structures Authors: Andrea Venturi, Imanol Jerico-Yoldi, Francesco Zola, Raul Orduna | Published: 2025-11-20 Privacy-Preserving Data MiningBlockchain Technology行動分析手法 2025.11.20 2025.11.22 Literature Database