ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1810.05711
  4. Cited By
ProPatrol: Attack Investigation via Extracted High-Level Tasks

ProPatrol: Attack Investigation via Extracted High-Level Tasks

12 October 2018
Sadegh M. Milajerdi
Birhanu Eshete
Rigel Gjomemo
V. Venkatakrishnan
ArXiv (abs)PDFHTML

Papers citing "ProPatrol: Attack Investigation via Extracted High-Level Tasks"

7 / 7 papers shown
Title
LESS: Efficient Log Storage System Based on Learned Model and Minimum
  Attribute Tree
LESS: Efficient Log Storage System Based on Learned Model and Minimum Attribute Tree
Zhiyang Cheng
Zizhen Zhu
Haoran Dang
Hai Wan
Xibin Zhao
81
0
0
26 Nov 2024
ORCHID: Streaming Threat Detection over Versioned Provenance Graphs
ORCHID: Streaming Threat Detection over Versioned Provenance Graphs
Akul Goyal
Jason Liu
Adam Bates
Gang Wang
AI4TS
45
1
0
23 Aug 2024
Ellipsis: Towards Efficient System Auditing for Real-Time Systems
Ellipsis: Towards Efficient System Auditing for Real-Time Systems
Ayoosh Bansal
Anant Kandikuppa
Chien-Ying Chen
M. Hasan
Adam Bates
Sibin Mohan
25
0
0
04 Aug 2022
ANUBIS: A Provenance Graph-Based Framework for Advanced Persistent
  Threat Detection
ANUBIS: A Provenance Graph-Based Framework for Advanced Persistent Threat Detection
M. Anjum
Shahrear Iqbal
B. Hamelin
47
30
0
21 Dec 2021
ProblemChild: Discovering Anomalous Patterns based on Parent-Child
  Process Relationships
ProblemChild: Discovering Anomalous Patterns based on Parent-Child Process Relationships
Bobby Filar
David French
28
3
0
11 Aug 2020
POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber
  Threat Hunting
POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting
Sadegh M. Milajerdi
Birhanu Eshete
Rigel Gjomemo
V. Venkatakrishnan
46
217
0
30 Sep 2019
HOLMES: Real-time APT Detection through Correlation of Suspicious
  Information Flows
HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows
Sadegh M. Milajerdi
Rigel Gjomemo
Birhanu Eshete
R. Sekar
V. Venkatakrishnan
93
406
0
03 Oct 2018
1