SteinerLog
Author:
Affiliation:
1. George Washington University, Washington, DC, USA
Funder
NSF (National Science Foundation)
DARPA
Publisher
ACM
Link
https://dl.acm.org/doi/pdf/10.1145/3488932.3523261
Reference50 articles.
1. A. Alshamrani S. Myneni A. Chowdhary and D. Huang. 2019. A Survey on Advanced Persistent Threats: Techniques Solutions Challenges and Research Opportunities. IEEE Communications Surveys Tutorials (2019). A. Alshamrani S. Myneni A. Chowdhary and D. Huang. 2019. A Survey on Advanced Persistent Threats: Techniques Solutions Challenges and Research Opportunities. IEEE Communications Surveys Tutorials (2019).
2. Md. Monowar Anjum , Shahrear Iqbal , and Benoit Hamelin . 2021. Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection Research. CoRR , Vol. abs/ 2103 .03080 ( 2021 ). showeprint[arXiv]2103.03080 https://arxiv.org/abs/2103.03080 Md. Monowar Anjum, Shahrear Iqbal, and Benoit Hamelin. 2021. Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection Research. CoRR, Vol. abs/2103.03080 (2021). showeprint[arXiv]2103.03080 https://arxiv.org/abs/2103.03080
3. Midas: Microcluster-Based Detector of Anomalies in Edge Streams
4. Before we knew it
5. The Mitre Corporation . 2022 a. ATT&CK Matrix for Enterprise. https://attack.mitre.org/ Retrieved March 6, 2022 from The Mitre Corporation. 2022 a. ATT&CK Matrix for Enterprise. https://attack.mitre.org/ Retrieved March 6, 2022 from
Cited by 12 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Evolving techniques in cyber threat hunting: A systematic review;Journal of Network and Computer Applications;2024-12
2. Prov2vec: Learning Provenance Graph Representation for Anomaly Detection in Computer Systems;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
3. eAudit: A Fast, Scalable and Deployable Audit Data Collection System*;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
4. Enhancing Network Security Against APTs Through SVM-Based Network Traffic Analysis: Identifying Anomalies in Communication Flows;2024 International Conference on Computing and Data Science (ICCDS);2024-04-26
5. MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning;IEEE Transactions on Information Forensics and Security;2024
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3