Mgda: A Provenance Graph-Based Framework for Threat Detection and Attack Scenario Reconstruction Article Swipe
Mengjiao Cui
,
Zhengwei Jiang
,
Shuai Cheng Li
,
Chunyan Ma
,
Kai Zhang
,
Peian Yang
,
Huamin Feng
·
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.2139/ssrn.5349101
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.2139/ssrn.5349101
Related Topics
Concepts
Metadata
- Type
- preprint
- Language
- en
- Landing Page
- https://doi.org/10.2139/ssrn.5349101
- OA Status
- green
- References
- 33
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4412365157
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4412365157Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.2139/ssrn.5349101Digital Object Identifier
- Title
-
Mgda: A Provenance Graph-Based Framework for Threat Detection and Attack Scenario ReconstructionWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-01-01Full publication date if available
- Authors
-
Mengjiao Cui, Zhengwei Jiang, Shuai Cheng Li, Chunyan Ma, Kai Zhang, Peian Yang, Huamin FengList of authors in order
- Landing page
-
https://doi.org/10.2139/ssrn.5349101Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.2139/ssrn.5349101Direct OA link when available
- Concepts
-
Provenance, Computer science, Graph, Computer security, Data science, Theoretical computer science, Data mining, Geology, PetrologyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
33Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4412365157 |
|---|---|
| doi | https://doi.org/10.2139/ssrn.5349101 |
| ids.doi | https://doi.org/10.2139/ssrn.5349101 |
| ids.openalex | https://openalex.org/W4412365157 |
| fwci | 0.0 |
| type | preprint |
| title | Mgda: A Provenance Graph-Based Framework for Threat Detection and Attack Scenario Reconstruction |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10734 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9976000189781189 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Information and Cyber Security |
| topics[1].id | https://openalex.org/T10400 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9973000288009644 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Network Security and Intrusion Detection |
| topics[2].id | https://openalex.org/T11241 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9972000122070312 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1711 |
| topics[2].subfield.display_name | Signal Processing |
| topics[2].display_name | Advanced Malware Detection Techniques |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C2780049196 |
| concepts[0].level | 2 |
| concepts[0].score | 0.6675801277160645 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q23582628 |
| concepts[0].display_name | Provenance |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.5991129875183105 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C132525143 |
| concepts[2].level | 2 |
| concepts[2].score | 0.4967842400074005 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q141488 |
| concepts[2].display_name | Graph |
| concepts[3].id | https://openalex.org/C38652104 |
| concepts[3].level | 1 |
| concepts[3].score | 0.3565208315849304 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[3].display_name | Computer security |
| concepts[4].id | https://openalex.org/C2522767166 |
| concepts[4].level | 1 |
| concepts[4].score | 0.33365437388420105 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q2374463 |
| concepts[4].display_name | Data science |
| concepts[5].id | https://openalex.org/C80444323 |
| concepts[5].level | 1 |
| concepts[5].score | 0.3233402967453003 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q2878974 |
| concepts[5].display_name | Theoretical computer science |
| concepts[6].id | https://openalex.org/C124101348 |
| concepts[6].level | 1 |
| concepts[6].score | 0.322903037071228 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q172491 |
| concepts[6].display_name | Data mining |
| concepts[7].id | https://openalex.org/C127313418 |
| concepts[7].level | 0 |
| concepts[7].score | 0.17233827710151672 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q1069 |
| concepts[7].display_name | Geology |
| concepts[8].id | https://openalex.org/C5900021 |
| concepts[8].level | 1 |
| concepts[8].score | 0.12454059720039368 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q163082 |
| concepts[8].display_name | Petrology |
| keywords[0].id | https://openalex.org/keywords/provenance |
| keywords[0].score | 0.6675801277160645 |
| keywords[0].display_name | Provenance |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.5991129875183105 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/graph |
| keywords[2].score | 0.4967842400074005 |
| keywords[2].display_name | Graph |
| keywords[3].id | https://openalex.org/keywords/computer-security |
| keywords[3].score | 0.3565208315849304 |
| keywords[3].display_name | Computer security |
| keywords[4].id | https://openalex.org/keywords/data-science |
| keywords[4].score | 0.33365437388420105 |
| keywords[4].display_name | Data science |
| keywords[5].id | https://openalex.org/keywords/theoretical-computer-science |
| keywords[5].score | 0.3233402967453003 |
| keywords[5].display_name | Theoretical computer science |
| keywords[6].id | https://openalex.org/keywords/data-mining |
| keywords[6].score | 0.322903037071228 |
| keywords[6].display_name | Data mining |
| keywords[7].id | https://openalex.org/keywords/geology |
| keywords[7].score | 0.17233827710151672 |
| keywords[7].display_name | Geology |
| keywords[8].id | https://openalex.org/keywords/petrology |
| keywords[8].score | 0.12454059720039368 |
| keywords[8].display_name | Petrology |
| language | en |
| locations[0].id | doi:10.2139/ssrn.5349101 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210172589 |
| locations[0].source.issn | 1556-5068 |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 1556-5068 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | SSRN Electronic Journal |
| locations[0].source.host_organization | https://openalex.org/I1318003438 |
| locations[0].source.host_organization_name | RELX Group (Netherlands) |
| locations[0].source.host_organization_lineage | https://openalex.org/I1318003438 |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | acceptedVersion |
| locations[0].raw_type | posted-content |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | https://doi.org/10.2139/ssrn.5349101 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5101338661 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Mengjiao Cui |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | MengJiao Cui |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5020151253 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Zhengwei Jiang |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Zhengwei Jiang |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5083428910 |
| authorships[2].author.orcid | https://orcid.org/0000-0001-6246-6349 |
| authorships[2].author.display_name | Shuai Cheng Li |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Shuai Li |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5100410916 |
| authorships[3].author.orcid | https://orcid.org/0009-0003-5154-8922 |
| authorships[3].author.display_name | Chunyan Ma |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Chunyan Ma |
| authorships[3].is_corresponding | False |
| authorships[4].author.id | https://openalex.org/A5056376119 |
| authorships[4].author.orcid | https://orcid.org/0000-0001-9728-4051 |
| authorships[4].author.display_name | Kai Zhang |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Kai Zhang |
| authorships[4].is_corresponding | False |
| authorships[5].author.id | https://openalex.org/A5105067729 |
| authorships[5].author.orcid | https://orcid.org/0009-0004-7226-8177 |
| authorships[5].author.display_name | Peian Yang |
| authorships[5].author_position | middle |
| authorships[5].raw_author_name | Peian Yang |
| authorships[5].is_corresponding | False |
| authorships[6].author.id | https://openalex.org/A5101473164 |
| authorships[6].author.orcid | https://orcid.org/0009-0008-3469-8802 |
| authorships[6].author.display_name | Huamin Feng |
| authorships[6].author_position | last |
| authorships[6].raw_author_name | Huamin Feng |
| authorships[6].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.2139/ssrn.5349101 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Mgda: A Provenance Graph-Based Framework for Threat Detection and Attack Scenario Reconstruction |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10734 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9976000189781189 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Information and Cyber Security |
| related_works | https://openalex.org/W2354627941, https://openalex.org/W2347483153, https://openalex.org/W2353379336, https://openalex.org/W2379683085, https://openalex.org/W2363868702, https://openalex.org/W2374448931, https://openalex.org/W2376723740, https://openalex.org/W2370535391, https://openalex.org/W2370679613, https://openalex.org/W2380057024 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.2139/ssrn.5349101 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210172589 |
| best_oa_location.source.issn | 1556-5068 |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 1556-5068 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | SSRN Electronic Journal |
| best_oa_location.source.host_organization | https://openalex.org/I1318003438 |
| best_oa_location.source.host_organization_name | RELX Group (Netherlands) |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I1318003438 |
| best_oa_location.license | |
| best_oa_location.pdf_url | |
| best_oa_location.version | acceptedVersion |
| best_oa_location.raw_type | posted-content |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | https://doi.org/10.2139/ssrn.5349101 |
| primary_location.id | doi:10.2139/ssrn.5349101 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210172589 |
| primary_location.source.issn | 1556-5068 |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 1556-5068 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | SSRN Electronic Journal |
| primary_location.source.host_organization | https://openalex.org/I1318003438 |
| primary_location.source.host_organization_name | RELX Group (Netherlands) |
| primary_location.source.host_organization_lineage | https://openalex.org/I1318003438 |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | acceptedVersion |
| primary_location.raw_type | posted-content |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | https://doi.org/10.2139/ssrn.5349101 |
| publication_date | 2025-01-01 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W2910711617, https://openalex.org/W3033087971, https://openalex.org/W3015650867, https://openalex.org/W2895460099, https://openalex.org/W2751114427, https://openalex.org/W2978956219, https://openalex.org/W3016038045, https://openalex.org/W2947745012, https://openalex.org/W3006711782, https://openalex.org/W3152911549, https://openalex.org/W2284900416, https://openalex.org/W3110889769, https://openalex.org/W3212868562, https://openalex.org/W4387724174, https://openalex.org/W4402288718, https://openalex.org/W4402265033, https://openalex.org/W4319663646, https://openalex.org/W4284975312, https://openalex.org/W2747669027, https://openalex.org/W2888974175, https://openalex.org/W4386914472, https://openalex.org/W4281555610, https://openalex.org/W4365440900, https://openalex.org/W2896457183, https://openalex.org/W2896507448, https://openalex.org/W4288057803, https://openalex.org/W4403462759, https://openalex.org/W4367047461, https://openalex.org/W4290876361, https://openalex.org/W3105780912, https://openalex.org/W3126165507, https://openalex.org/W4297733535, https://openalex.org/W2962703433 |
| referenced_works_count | 33 |
| abstract_inverted_index | |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 7 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/13 |
| sustainable_development_goals[0].score | 0.6299999952316284 |
| sustainable_development_goals[0].display_name | Climate action |
| citation_normalized_percentile.value | 0.37663419 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |