Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1905.10328
Cited By
Tiresias: Predicting Security Events Through Deep Learning
24 May 2019
Yun Shen
Enrico Mariconti
Pierre-Antoine Vervier
Gianluca Stringhini
AAML
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Tiresias: Predicting Security Events Through Deep Learning"
26 / 26 papers shown
Title
Automated Alert Classification and Triage (AACT): An Intelligent System for the Prioritisation of Cybersecurity Alerts
Melissa Turcotte
François Labrèche
Serge-Olivier Paquette
19
0
0
14 May 2025
Tweezers: A Framework for Security Event Detection via Event Attribution-centric Tweet Embedding
Jian Cui
Hanna Kim
Eugene Jang
Dayeon Yim
Kicheol Kim
Yongjae Lee
Jin-Woo Chung
Seungwon Shin
Xiaojing Liao
33
0
0
12 Sep 2024
ORCHID: Streaming Threat Detection over Versioned Provenance Graphs
Akul Goyal
Jason Liu
Adam Bates
Gang Wang
AI4TS
21
1
0
23 Aug 2024
EagleEye: Attention to Unveil Malicious Event Sequences from Provenance Graphs
Philipp Gysel
Candid Wuest
Kenneth Nwafor
Otakar Jašek
Andrey Ustyuzhanin
D. Divakaran
37
0
0
17 Aug 2024
Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks in Real-time through Cyber Threat Intelligence Reports
Tiantian Zhu
Jie Ying
Tieming Chen
Chunlin Xiong
Wenrui Cheng
Qixuan Yuan
Aohan Zheng
Mingqi Lv
Yan Chen
36
4
0
05 May 2024
LAN: Learning Adaptive Neighbors for Real-Time Insider Threat Detection
Xiangrui Cai
Yang Wang
Sihan Xu
Hao Li
Ying Zhang
Zheli Liu
Xiaojie Yuan
36
2
0
14 Mar 2024
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning
Zian Jia
Yun Xiong
Yuhong Nan
Yao Zhang
Jinjing Zhao
Mi Wen
21
16
0
15 Oct 2023
Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation
Peng Jiang
Ruizhe Huang
Ding Li
Yao Guo
Xiangqun Chen
Jianhai Luan
Yuxin Ren
Xinwei Hu
8
5
0
29 Jul 2023
Cerberus: Exploring Federated Prediction of Security Events
Mohammad Naseri
Yufei Han
Enrico Mariconti
Yun Shen
Gianluca Stringhini
Emiliano De Cristofaro
FedML
45
14
0
07 Sep 2022
Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior
Enes Altinisik
H. Sencar
Mohamed Nabeel
Issa M. Khalil
Tingyue Yu
14
0
0
12 Jun 2022
NetSentry: A Deep Learning Approach to Detecting Incipient Large-scale Network Attacks
Haoyu Liu
P. Patras
AAML
16
10
0
20 Feb 2022
Collaborative adversary nodes learning on the logs of IoT devices in an IoT network
Sandhya Aneja
Melanie Ang Xuan En
Nagender Aneja
19
2
0
22 Dec 2021
A Heterogeneous Graph Learning Model for Cyber-Attack Detection
Mingqi Lv
Chengyu Dong
Tieming Chen
Tiantian Zhu
Qijie Song
Yuan Fan
AAML
14
4
0
16 Dec 2021
A Comprehensive Survey of Logging in Software: From Logging Statements Automation to Log Mining and Analysis
Sina Gholamian
Paul A. S. Ward
19
16
0
24 Oct 2021
STEP: Spatial-Temporal Network Security Event Prediction
Qiumei Cheng
Yi Shen
Dezhang Kong
Chunming Wu
17
2
0
31 May 2021
ANDRUSPEX : Leveraging Graph Representation Learning to Predict Harmful App Installations on Mobile Devices
Yun Shen
Gianluca Stringhini
8
4
0
09 Mar 2021
Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-Supervised Neural Networks
Xiaoyong Yuan
Lei Ding
M. B. Salem
Xiaolin Li
D. Wu
6
1
0
31 Aug 2020
SIGL: Securing Software Installations Through Deep Graph Learning
Xueyuan Han
Xiao Yu
Thomas Pasquier
Ding Li
J. Rhee
James W. Mickens
Margo Seltzer
Haifeng Chen
18
49
0
26 Aug 2020
Event Prediction in the Big Data Era: A Systematic Survey
Liang Zhao
AI4TS
17
53
0
19 Jul 2020
Unsupervised Learning for security of Enterprise networks by micro-segmentation
Mahmood Yousefi-Azar
M. Kâafar
A. Walker
15
2
0
25 Mar 2020
Multi-Class classification of vulnerabilities in Smart Contracts using AWD-LSTM, with pre-trained encoder inspired from natural language processing
Ajay K. Gogineni
S. Swayamjyoti
Devadatta Sahoo
K. Sahu
R. Kishore
23
32
0
21 Mar 2020
HyperSched: Dynamic Resource Reallocation for Model Development on a Deadline
Richard Liaw
Romil Bhardwaj
Lisa Dunlap
Yitian Zou
Joseph E. Gonzalez
Ion Stoica
Alexey Tumanov
18
44
0
08 Jan 2020
On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks
Christopher Sweet
Stephen Moskal
S. Yang
GAN
11
1
0
03 Aug 2019
FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning
Berk Gülmezoglu
A. Moghimi
T. Eisenbarth
B. Sunar
AAML
11
37
0
08 Jul 2019
ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks
Yun Shen
Gianluca Stringhini
11
62
0
29 May 2019
Towards Safer Smart Contracts: A Sequence Learning Approach to Detecting Security Threats
W. Tann
X. Han
Sourav Sengupta
Yew-Soon Ong
12
35
0
16 Nov 2018
1