ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1812.02867
  4. Cited By
How do information security workers use host data? A summary of
  interviews with security analysts

How do information security workers use host data? A summary of interviews with security analysts

7 December 2018
Robert A. Bridges
Michael D. Iannacone
J. Goodall
Justin M. Beaver
ArXiv (abs)PDFHTML

Papers citing "How do information security workers use host data? A summary of interviews with security analysts"

7 / 7 papers shown
SoK: Honeypots & LLMs, More Than the Sum of Their Parts?
SoK: Honeypots & LLMs, More Than the Sum of Their Parts?
Robert A. Bridges
Thomas R. Mitchell
Mauricio Muñoz
Ted Henriksson
336
0
0
29 Oct 2025
You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise
  Networks
You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks
Rafael Uetz
Marco Herzog
Louis Hackländer
Simon Schwarz
Martin Henze
AAML
298
23
0
16 Nov 2023
Testing SOAR Tools in Use
Testing SOAR Tools in UseComputers & security (Comput. Secur.), 2022
Robert A. Bridges
Ashley E. Rice
Sean Oesch
Jeffrey A. Nichols
Cory L. Watson
...
Brian Weber
C. Gannon
Olivia Bizovi
Samuel C. Hollifield
Samantha Erwin
178
31
0
12 Aug 2022
Beyond the Hype: A Real-World Evaluation of the Impact and Cost of
  Machine Learning-Based Malware Detection
Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection
Robert A. Bridges
Sean Oesch
Miki E. Verma
Michael D. Iannacone
Kelly M. T. Huffer
...
Daniel Scofield
Craig Miles
Thomas Plummer
Mark Daniell
Anne M. Tall
207
7
0
16 Dec 2020
An Assessment of the Usability of Machine Learning Based Tools for the
  Security Operations Center
An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center
Sean Oesch
Robert A. Bridges
Jared M. Smith
Justin M. Beaver
J. Goodall
Kelly M. T. Huffer
Craig Miles
Daniel Scofield
ELM
156
24
0
16 Dec 2020
Automated Ransomware Behavior Analysis: Pattern Extraction and Early
  Detection
Automated Ransomware Behavior Analysis: Pattern Extraction and Early DetectionInternational Conference on Science of Cyber Security (ICSCS), 2019
Qian Chen
Sheikh Rabiul Islam
Henry Haswell
Robert A. Bridges
AAML
145
26
0
15 Oct 2019
Quantifiable & Comparable Evaluations of Cyber Defensive Capabilities: A
  Survey & Novel, Unified Approach
Quantifiable & Comparable Evaluations of Cyber Defensive Capabilities: A Survey & Novel, Unified Approach
Michael D. Iannacone
Robert A. Bridges
149
1
0
31 Jan 2019
1
Page 1 of 1