Research Article: Graph Neural Intrusion Detection for CI Pipelines
Abstract
We model CI graphs and artifact flows with GNNs to detect tampering and suspicious privilege edges, reaching 0.91 F1 on a public corpus.
Cite this article
Phillips, A. (2024). Research Article: Graph Neural Intrusion Detection for CI Pipelines. Research Explorations in Global Knowledge & Technology (REGKT), 3 (11). Retrieved from https://regkt.com/article.php?id=296&slug=graph-neural-intrusion-detection-for-ci-pipelines