ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1905.10328
  4. Cited By
Tiresias: Predicting Security Events Through Deep Learning

Tiresias: Predicting Security Events Through Deep Learning

24 May 2019
Yun Shen
Enrico Mariconti
Pierre-Antoine Vervier
Gianluca Stringhini
    AAML
ArXivPDFHTML

Papers citing "Tiresias: Predicting Security Events Through Deep Learning"

26 / 26 papers shown
Title
Automated Alert Classification and Triage (AACT): An Intelligent System for the Prioritisation of Cybersecurity Alerts
Automated Alert Classification and Triage (AACT): An Intelligent System for the Prioritisation of Cybersecurity Alerts
Melissa Turcotte
François Labrèche
Serge-Olivier Paquette
19
0
0
14 May 2025
Tweezers: A Framework for Security Event Detection via Event
  Attribution-centric Tweet Embedding
Tweezers: A Framework for Security Event Detection via Event Attribution-centric Tweet Embedding
Jian Cui
Hanna Kim
Eugene Jang
Dayeon Yim
Kicheol Kim
Yongjae Lee
Jin-Woo Chung
Seungwon Shin
Xiaojing Liao
33
0
0
12 Sep 2024
ORCHID: Streaming Threat Detection over Versioned Provenance Graphs
ORCHID: Streaming Threat Detection over Versioned Provenance Graphs
Akul Goyal
Jason Liu
Adam Bates
Gang Wang
AI4TS
21
1
0
23 Aug 2024
EagleEye: Attention to Unveil Malicious Event Sequences from Provenance
  Graphs
EagleEye: Attention to Unveil Malicious Event Sequences from Provenance Graphs
Philipp Gysel
Candid Wuest
Kenneth Nwafor
Otakar Jašek
Andrey Ustyuzhanin
D. Divakaran
37
0
0
17 Aug 2024
Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks
  in Real-time through Cyber Threat Intelligence Reports
Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks in Real-time through Cyber Threat Intelligence Reports
Tiantian Zhu
Jie Ying
Tieming Chen
Chunlin Xiong
Wenrui Cheng
Qixuan Yuan
Aohan Zheng
Mingqi Lv
Yan Chen
36
4
0
05 May 2024
LAN: Learning Adaptive Neighbors for Real-Time Insider Threat Detection
LAN: Learning Adaptive Neighbors for Real-Time Insider Threat Detection
Xiangrui Cai
Yang Wang
Sihan Xu
Hao Li
Ying Zhang
Zheli Liu
Xiaojie Yuan
36
2
0
14 Mar 2024
MAGIC: Detecting Advanced Persistent Threats via Masked Graph
  Representation Learning
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning
Zian Jia
Yun Xiong
Yuhong Nan
Yao Zhang
Jinjing Zhao
Mi Wen
21
16
0
15 Oct 2023
Auditing Frameworks Need Resource Isolation: A Systematic Study on the
  Super Producer Threat to System Auditing and Its Mitigation
Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation
Peng Jiang
Ruizhe Huang
Ding Li
Yao Guo
Xiangqun Chen
Jianhai Luan
Yuxin Ren
Xinwei Hu
8
5
0
29 Jul 2023
Cerberus: Exploring Federated Prediction of Security Events
Cerberus: Exploring Federated Prediction of Security Events
Mohammad Naseri
Yufei Han
Enrico Mariconti
Yun Shen
Gianluca Stringhini
Emiliano De Cristofaro
FedML
45
14
0
07 Sep 2022
Exploration of Enterprise Server Data to Assess Ease of Modeling System
  Behavior
Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior
Enes Altinisik
H. Sencar
Mohamed Nabeel
Issa M. Khalil
Tingyue Yu
14
0
0
12 Jun 2022
NetSentry: A Deep Learning Approach to Detecting Incipient Large-scale
  Network Attacks
NetSentry: A Deep Learning Approach to Detecting Incipient Large-scale Network Attacks
Haoyu Liu
P. Patras
AAML
16
10
0
20 Feb 2022
Collaborative adversary nodes learning on the logs of IoT devices in an
  IoT network
Collaborative adversary nodes learning on the logs of IoT devices in an IoT network
Sandhya Aneja
Melanie Ang Xuan En
Nagender Aneja
19
2
0
22 Dec 2021
A Heterogeneous Graph Learning Model for Cyber-Attack Detection
A Heterogeneous Graph Learning Model for Cyber-Attack Detection
Mingqi Lv
Chengyu Dong
Tieming Chen
Tiantian Zhu
Qijie Song
Yuan Fan
AAML
14
4
0
16 Dec 2021
A Comprehensive Survey of Logging in Software: From Logging Statements
  Automation to Log Mining and Analysis
A Comprehensive Survey of Logging in Software: From Logging Statements Automation to Log Mining and Analysis
Sina Gholamian
Paul A. S. Ward
19
16
0
24 Oct 2021
STEP: Spatial-Temporal Network Security Event Prediction
STEP: Spatial-Temporal Network Security Event Prediction
Qiumei Cheng
Yi Shen
Dezhang Kong
Chunming Wu
17
2
0
31 May 2021
ANDRUSPEX : Leveraging Graph Representation Learning to Predict Harmful
  App Installations on Mobile Devices
ANDRUSPEX : Leveraging Graph Representation Learning to Predict Harmful App Installations on Mobile Devices
Yun Shen
Gianluca Stringhini
8
4
0
09 Mar 2021
Connecting Web Event Forecasting with Anomaly Detection: A Case Study on
  Enterprise Web Applications Using Self-Supervised Neural Networks
Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-Supervised Neural Networks
Xiaoyong Yuan
Lei Ding
M. B. Salem
Xiaolin Li
D. Wu
6
1
0
31 Aug 2020
SIGL: Securing Software Installations Through Deep Graph Learning
SIGL: Securing Software Installations Through Deep Graph Learning
Xueyuan Han
Xiao Yu
Thomas Pasquier
Ding Li
J. Rhee
James W. Mickens
Margo Seltzer
Haifeng Chen
18
49
0
26 Aug 2020
Event Prediction in the Big Data Era: A Systematic Survey
Event Prediction in the Big Data Era: A Systematic Survey
Liang Zhao
AI4TS
17
53
0
19 Jul 2020
Unsupervised Learning for security of Enterprise networks by
  micro-segmentation
Unsupervised Learning for security of Enterprise networks by micro-segmentation
Mahmood Yousefi-Azar
M. Kâafar
A. Walker
15
2
0
25 Mar 2020
Multi-Class classification of vulnerabilities in Smart Contracts using
  AWD-LSTM, with pre-trained encoder inspired from natural language processing
Multi-Class classification of vulnerabilities in Smart Contracts using AWD-LSTM, with pre-trained encoder inspired from natural language processing
Ajay K. Gogineni
S. Swayamjyoti
Devadatta Sahoo
K. Sahu
R. Kishore
23
32
0
21 Mar 2020
HyperSched: Dynamic Resource Reallocation for Model Development on a
  Deadline
HyperSched: Dynamic Resource Reallocation for Model Development on a Deadline
Richard Liaw
Romil Bhardwaj
Lisa Dunlap
Yitian Zou
Joseph E. Gonzalez
Ion Stoica
Alexey Tumanov
18
44
0
08 Jan 2020
On the Veracity of Cyber Intrusion Alerts Synthesized by Generative
  Adversarial Networks
On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks
Christopher Sweet
Stephen Moskal
S. Yang
GAN
11
1
0
03 Aug 2019
FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised
  Deep Learning
FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning
Berk Gülmezoglu
A. Moghimi
T. Eisenbarth
B. Sunar
AAML
11
37
0
08 Jul 2019
ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the
  Evolution of Cyberattacks
ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks
Yun Shen
Gianluca Stringhini
11
62
0
29 May 2019
Towards Safer Smart Contracts: A Sequence Learning Approach to Detecting
  Security Threats
Towards Safer Smart Contracts: A Sequence Learning Approach to Detecting Security Threats
W. Tann
X. Han
Sourav Sengupta
Yew-Soon Ong
12
35
0
16 Nov 2018
1