Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1806.00934
Cited By
Provenance-based Intrusion Detection: Opportunities and Challenges
4 June 2018
Xueyuan Han
Thomas Pasquier
Margo Seltzer
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Provenance-based Intrusion Detection: Opportunities and Challenges"
14 / 14 papers shown
Title
Exploring Answer Set Programming for Provenance Graph-Based Cyber Threat Detection: A Novel Approach
Fang Li
Fei Zuo
Gopal Gupta
53
0
0
24 Jan 2025
Hack Me If You Can: Aggregating AutoEncoders for Countering Persistent Access Threats Within Highly Imbalanced Data
Sidahmed Benabderrahmane
Ngoc Hoang
Petko Valtchev
James Cheney
Talal Rahwan
54
3
0
27 Jun 2024
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools
Feng Dong
Shaofei Li
Peng Jiang
Ding Li
Haoyu Wang
...
Xusheng Xiao
Jiedong Chen
Xiapu Luo
Yao Guo
Xiangqun Chen
39
25
0
17 Jul 2023
Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior
Enes Altinisik
Husrev Taha Sencar
Mohamed Nabeel
Issa M. Khalil
Tingyue Yu
45
0
0
12 Jun 2022
A Heterogeneous Graph Learning Model for Cyber-Attack Detection
Mingqi Lv
Chengyu Dong
Tieming Chen
Tiantian Zhu
Qijie Song
Yuan Fan
AAML
36
4
0
16 Dec 2021
A Rule Mining-Based Advanced Persistent Threats Detection System
Sidahmed Benabderrahmane
Ghita Berrada
James Cheney
Petko Valtchev
41
7
0
20 May 2021
Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector
Peilun Wu
Hui Guo
28
4
0
16 Apr 2021
Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection Research
M. Anjum
Shahrear Iqbal
B. Hamelin
50
33
0
04 Mar 2021
Guarding Serverless Applications with SecLambda
Deepak Sirone Jegan
Liang Wang
Siddhant Bhagat
Thomas Ristenpart
M. Swift
31
12
0
10 Nov 2020
SIGL: Securing Software Installations Through Deep Graph Learning
Xueyuan Han
Xiao Yu
Thomas Pasquier
Ding Li
J. Rhee
James W. Mickens
Margo Seltzer
Haifeng Chen
85
52
0
26 Aug 2020
Threat Detection and Investigation with System-level Provenance Graphs: A Survey
Zhenyuan Li
Qi Alfred Chen
Runqing Yang
Yan Chen
62
85
0
02 Jun 2020
Xanthus: Push-button Orchestration of Host Provenance Data Collection
Xueyuan Han
James W. Mickens
Ashish Gehani
Margo Seltzer
Thomas Pasquier
20
7
0
10 May 2020
Detecting Safety and Security Faults in PLC Systems with Data Provenance
A. Farooq
J. Marquard
K. George
Thomas Moyer
8
10
0
14 Nov 2019
Runtime Analysis of Whole-System Provenance
Thomas Pasquier
Xueyuan Han
Thomas Moyer
Adam Bates
O. Hermant
David Eyers
J. Bacon
Margo Seltzer
71
96
0
18 Aug 2018
1