“…• Application of human-defined knowledge [3,7,30,55,87] • Modeling trojan/ransomware behaviors [6,41,46,89] • Modeling botnet behaviors [5,28,37,62,97] • Modeling malicious download behaviors [36,45,46,84] • Modeling malicious browser extension behaviors [40] • Modeling malware behaviors [4,18,44,51,60,86] • Modeling malicious graph communities [39,70,91,97] • Modeling permitted behaviors [17,24,25,29,82,88] • Knowledge discovery on graphs [71,81,94] • Attack causality tracking and inference [42,47,54,85] • Anomaly detection [16,20,23,50,58,59,...…”