Communities
Connect sessions
AI calendar
Organizations
Join Slack
Contact Sales
Search
Open menu
Home
Papers
1812.02867
Cited By
How do information security workers use host data? A summary of interviews with security analysts
7 December 2018
Robert A. Bridges
Michael D. Iannacone
J. Goodall
Justin M. Beaver
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"How do information security workers use host data? A summary of interviews with security analysts"
7 / 7 papers shown
SoK: Honeypots & LLMs, More Than the Sum of Their Parts?
Robert A. Bridges
Thomas R. Mitchell
Mauricio Muñoz
Ted Henriksson
336
0
0
29 Oct 2025
You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks
Rafael Uetz
Marco Herzog
Louis Hackländer
Simon Schwarz
Martin Henze
AAML
298
23
0
16 Nov 2023
Testing SOAR Tools in Use
Computers & security (Comput. Secur.), 2022
Robert A. Bridges
Ashley E. Rice
Sean Oesch
Jeffrey A. Nichols
Cory L. Watson
...
Brian Weber
C. Gannon
Olivia Bizovi
Samuel C. Hollifield
Samantha Erwin
178
31
0
12 Aug 2022
Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection
Robert A. Bridges
Sean Oesch
Miki E. Verma
Michael D. Iannacone
Kelly M. T. Huffer
...
Daniel Scofield
Craig Miles
Thomas Plummer
Mark Daniell
Anne M. Tall
207
7
0
16 Dec 2020
An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center
Sean Oesch
Robert A. Bridges
Jared M. Smith
Justin M. Beaver
J. Goodall
Kelly M. T. Huffer
Craig Miles
Daniel Scofield
ELM
156
24
0
16 Dec 2020
Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection
International Conference on Science of Cyber Security (ICSCS), 2019
Qian Chen
Sheikh Rabiul Islam
Henry Haswell
Robert A. Bridges
AAML
145
26
0
15 Oct 2019
Quantifiable & Comparable Evaluations of Cyber Defensive Capabilities: A Survey & Novel, Unified Approach
Michael D. Iannacone
Robert A. Bridges
149
1
0
31 Jan 2019
1
Page 1 of 1