1. Learning to rank for alert triage;Bierma,2016
2. Holmes: real-time apt detection through correlation of suspicious information flows;Milajerdi,2019
3. Tactical provenance analysis for endpoint detection and response systems;Hassan,2020
4. Enabling efficient cyber threat hunting with cyber threat intelligence;Gao,2021
5. Deep learning for unsupervised insider threat detection in structured cybersecurity data streams;Tuor,2017