ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1806.00934
  4. Cited By
Provenance-based Intrusion Detection: Opportunities and Challenges

Provenance-based Intrusion Detection: Opportunities and Challenges

4 June 2018
Xueyuan Han
Thomas Pasquier
Margo Seltzer
ArXiv (abs)PDFHTML

Papers citing "Provenance-based Intrusion Detection: Opportunities and Challenges"

14 / 14 papers shown
Title
Exploring Answer Set Programming for Provenance Graph-Based Cyber Threat Detection: A Novel Approach
Exploring Answer Set Programming for Provenance Graph-Based Cyber Threat Detection: A Novel Approach
Fang Li
Fei Zuo
Gopal Gupta
53
0
0
24 Jan 2025
Hack Me If You Can: Aggregating AutoEncoders for Countering Persistent
  Access Threats Within Highly Imbalanced Data
Hack Me If You Can: Aggregating AutoEncoders for Countering Persistent Access Threats Within Highly Imbalanced Data
Sidahmed Benabderrahmane
Ngoc Hoang
Petko Valtchev
James Cheney
Talal Rahwan
54
3
0
27 Jun 2024
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint
  Detection and Response Tools
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools
Feng Dong
Shaofei Li
Peng Jiang
Ding Li
Haoyu Wang
...
Xusheng Xiao
Jiedong Chen
Xiapu Luo
Yao Guo
Xiangqun Chen
39
25
0
17 Jul 2023
Exploration of Enterprise Server Data to Assess Ease of Modeling System
  Behavior
Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior
Enes Altinisik
Husrev Taha Sencar
Mohamed Nabeel
Issa M. Khalil
Tingyue Yu
45
0
0
12 Jun 2022
A Heterogeneous Graph Learning Model for Cyber-Attack Detection
A Heterogeneous Graph Learning Model for Cyber-Attack Detection
Mingqi Lv
Chengyu Dong
Tieming Chen
Tiantian Zhu
Qijie Song
Yuan Fan
AAML
36
4
0
16 Dec 2021
A Rule Mining-Based Advanced Persistent Threats Detection System
A Rule Mining-Based Advanced Persistent Threats Detection System
Sidahmed Benabderrahmane
Ghita Berrada
James Cheney
Petko Valtchev
41
7
0
20 May 2021
Holmes: An Efficient and Lightweight Semantic Based Anomalous Email
  Detector
Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector
Peilun Wu
Hui Guo
28
4
0
16 Apr 2021
Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat
  Detection Research
Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection Research
M. Anjum
Shahrear Iqbal
B. Hamelin
50
33
0
04 Mar 2021
Guarding Serverless Applications with SecLambda
Guarding Serverless Applications with SecLambda
Deepak Sirone Jegan
Liang Wang
Siddhant Bhagat
Thomas Ristenpart
M. Swift
31
12
0
10 Nov 2020
SIGL: Securing Software Installations Through Deep Graph Learning
SIGL: Securing Software Installations Through Deep Graph Learning
Xueyuan Han
Xiao Yu
Thomas Pasquier
Ding Li
J. Rhee
James W. Mickens
Margo Seltzer
Haifeng Chen
85
52
0
26 Aug 2020
Threat Detection and Investigation with System-level Provenance Graphs:
  A Survey
Threat Detection and Investigation with System-level Provenance Graphs: A Survey
Zhenyuan Li
Qi Alfred Chen
Runqing Yang
Yan Chen
62
85
0
02 Jun 2020
Xanthus: Push-button Orchestration of Host Provenance Data Collection
Xanthus: Push-button Orchestration of Host Provenance Data Collection
Xueyuan Han
James W. Mickens
Ashish Gehani
Margo Seltzer
Thomas Pasquier
20
7
0
10 May 2020
Detecting Safety and Security Faults in PLC Systems with Data Provenance
Detecting Safety and Security Faults in PLC Systems with Data Provenance
A. Farooq
J. Marquard
K. George
Thomas Moyer
8
10
0
14 Nov 2019
Runtime Analysis of Whole-System Provenance
Runtime Analysis of Whole-System Provenance
Thomas Pasquier
Xueyuan Han
Thomas Moyer
Adam Bates
O. Hermant
David Eyers
J. Bacon
Margo Seltzer
71
96
0
18 Aug 2018
1