Latest version: v0.4.4
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Python algorithm to discover, from an event log, prioritization rules that lead to one activity instance to be executed before another.
No known vulnerabilities found