ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1506.04200
  4. Cited By
Malicious Behavior Detection using Windows Audit Logs
v1v2 (latest)

Malicious Behavior Detection using Windows Audit Logs

13 June 2015
Konstantin Berlin
David Slater
Joshua Saxe
ArXiv (abs)PDFHTML

Papers citing "Malicious Behavior Detection using Windows Audit Logs"

19 / 19 papers shown
JobSphere: An AI-Powered Multilingual Career Copilot for Government Employment Platforms
JobSphere: An AI-Powered Multilingual Career Copilot for Government Employment Platforms
Srihari R
Adarsha B V
Mohammed Usman Hussain
Shweta Singh
246
0
0
11 Nov 2025
MADAR: Efficient Continual Learning for Malware Analysis with Distribution-Aware Replay
MADAR: Efficient Continual Learning for Malware Analysis with Distribution-Aware Replay
Mohammad Saidur Rahman
Scott E. Coull
Qi Yu
M. Wright
AAML
688
4
0
09 Feb 2025
A Comprehensive Analysis of the Role of Artificial Intelligence and
  Machine Learning in Modern Digital Forensics and Incident Response
A Comprehensive Analysis of the Role of Artificial Intelligence and Machine Learning in Modern Digital Forensics and Incident Response
Dipo Dunsin
M. C. Ghanem
Karim Ouazzane
Vassil T. Vassilev
323
94
0
13 Sep 2023
Auditing Frameworks Need Resource Isolation: A Systematic Study on the
  Super Producer Threat to System Auditing and Its Mitigation
Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its MitigationUSENIX Security Symposium (USENIX Security), 2023
Peng Jiang
Ruizhe Huang
Ding Li
Yao Guo
Xiangqun Chen
Jianhai Luan
Yuxin Ren
Xinwei Hu
133
12
0
29 Jul 2023
On the Limitations of Continual Learning for Malware Classification
On the Limitations of Continual Learning for Malware Classification
Mohammad Saidur Rahman
Scott E. Coull
M. Wright
201
25
0
13 Aug 2022
A Survey on Threat Situation Awareness Systems: Framework, Techniques,
  and Insights
A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights
Hooman Alavizadeh
Julian Jang
S. Y. Enoch
Harith Al-Sahaf
I. Welch
S. Çamtepe
Dong Seong Kim
148
7
0
29 Oct 2021
A Survey of Machine Learning Methods and Challenges for Windows Malware
  Classification
A Survey of Machine Learning Methods and Challenges for Windows Malware Classification
Edward Raff
Charles K. Nicholas
AAML
387
69
0
15 Jun 2020
Computer Systems Have 99 Problems, Let's Not Make Machine Learning
  Another One
Computer Systems Have 99 Problems, Let's Not Make Machine Learning Another OneInternational Conference on Trust, Privacy and Security in Intelligent Systems and Applications (ICPSISA), 2019
David A. Mohaisen
Songqing Chen
225
0
0
28 Nov 2019
Dynamic Malware Analysis with Feature Engineering and Feature Learning
Dynamic Malware Analysis with Feature Engineering and Feature LearningAAAI Conference on Artificial Intelligence (AAAI), 2019
Zhaoqi Zhang
Panpan Qi
Wei Wang
294
151
0
17 Jul 2019
Network-based Analysis and Classification of Malware using Behavioral
  Artifacts Ordering
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering
Aziz Mohaisen
Omar Alrawi
Jeman Park
Joongheon Kim
Daehun Nyang
Manar Mohaisen
143
9
0
04 Jan 2019
Defining a Metric Space of Host Logs and Operational Use Cases
Defining a Metric Space of Host Logs and Operational Use Cases
Miki E. Verma
Robert A. Bridges
152
11
0
01 Nov 2018
HOLMES: Real-time APT Detection through Correlation of Suspicious
  Information Flows
HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows
Sadegh M. Milajerdi
Rigel Gjomemo
Birhanu Eshete
R. Sekar
V. Venkatakrishnan
313
548
0
03 Oct 2018
Monotonic models for real-time dynamic malware detection
Monotonic models for real-time dynamic malware detection
A. Chistyakov
E. Lobacheva
Alexander Shevelev
Alexey Romanenko
77
3
0
10 Apr 2018
Semantic embeddings for program behavior patterns
Semantic embeddings for program behavior patterns
A. Chistyakov
E. Lobacheva
Arseny Kuznetsov
Alexey Romanenko
123
6
0
10 Apr 2018
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
M. Hossain
Sadegh M. Milajerdi
Junao Wang
Birhanu Eshete
Rigel Gjomemo
R. Sekar
Scott D. Stoller
V. Venkatakrishnan
204
289
0
06 Jan 2018
eXpose: A Character-Level Convolutional Neural Network with Embeddings
  For Detecting Malicious URLs, File Paths and Registry Keys
eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys
Joshua Saxe
Konstantin Berlin
205
219
0
27 Feb 2017
Learning Adversary-Resistant Deep Neural Networks
Learning Adversary-Resistant Deep Neural Networks
Qinglong Wang
Wenbo Guo
Kaixuan Zhang
Alexander Ororbia
Masashi Sugiyama
Xue Liu
C. Lee Giles
AAML
316
44
0
05 Dec 2016
Adversary Resistant Deep Neural Networks with an Application to Malware
  Detection
Adversary Resistant Deep Neural Networks with an Application to Malware DetectionKnowledge Discovery and Data Mining (KDD), 2016
Qinglong Wang
Wenbo Guo
Kaixuan Zhang
Alexander Ororbia
Masashi Sugiyama
C. Lee Giles
Xue Liu
AAML
509
181
0
05 Oct 2016
Deep Neural Network Based Malware Detection Using Two Dimensional Binary
  Program Features
Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program FeaturesInternational Conference on Malicious and Unwanted Software (ICMUS), 2015
Joshua Saxe
Konstantin Berlin
407
692
0
13 Aug 2015
1
Page 1 of 1