ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2001.01525
  4. Cited By
UNICORN: Runtime Provenance-Based Detector for Advanced Persistent
  Threats
v1v2 (latest)

UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats

Network and Distributed System Security Symposium (NDSS), 2020
6 January 2020
Xueyuan Han
Thomas Pasquier
Adam Bates
James W. Mickens
Margo Seltzer
ArXiv (abs)PDFHTML

Papers citing "UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats"

50 / 93 papers shown
SecTracer: A Framework for Uncovering the Root Causes of Network Intrusions via Security Provenance
SecTracer: A Framework for Uncovering the Root Causes of Network Intrusions via Security Provenance
Seunghyeon Lee
Hyunmin Seo
Hwanjo Heo
Anduo Wang
Seungwon Shin
Jinwoo Kim
132
1
0
12 Nov 2025
A Survey of Heterogeneous Graph Neural Networks for Cybersecurity Anomaly Detection
A Survey of Heterogeneous Graph Neural Networks for Cybersecurity Anomaly Detection
Laura Jiang
Reza Ryan
Qian Li
Nasim Ferdosian
161
1
0
30 Oct 2025
OCR-APT: Reconstructing APT Stories from Audit Logs using Subgraph Anomaly Detection and LLMs
OCR-APT: Reconstructing APT Stories from Audit Logs using Subgraph Anomaly Detection and LLMs
Ahmed Aly
Essam Mansour
Amr Youssef
185
9
0
16 Oct 2025
Ancora: Accurate Intrusion Recovery for Web Applications
Ancora: Accurate Intrusion Recovery for Web Applications
Yihao Peng
Biao Ma
Hai Wan
Xibin Zhao
171
0
0
09 Oct 2025
DeepProv: Behavioral Characterization and Repair of Neural Networks via Inference Provenance Graph Analysis
DeepProv: Behavioral Characterization and Repair of Neural Networks via Inference Provenance Graph Analysis
Firas Ben Hmida
Abderrahmen Amich
Ata Kaboudi
Birhanu Eshete
AAMLGNN
232
0
0
30 Sep 2025
An Automated Attack Investigation Approach Leveraging Threat-Knowledge-Augmented Large Language Models
An Automated Attack Investigation Approach Leveraging Threat-Knowledge-Augmented Large Language Models
Rujie Dai
Peizhuo Lv
Yujiang Gui
Qiujian Lv
Yuanyuan Qiao
Yan Wang
Degang Sun
Weiqing Huang
Yingjiu Li
X. Wang
159
1
0
01 Sep 2025
LLM-driven Provenance Forensics for Threat Investigation and Detection
LLM-driven Provenance Forensics for Threat Investigation and Detection
Kunal Mukherjee
Murat Kantarcioglu
174
6
0
29 Aug 2025
DEFENDCLI: {Command-Line} Driven Attack Provenance Examination
DEFENDCLI: {Command-Line} Driven Attack Provenance Examination
Peilun Wu
Nan Sun
Nour Moustafa
Youyang Qu
Ming Ding
AAML
189
0
0
18 Aug 2025
MirGuard: Towards a Robust Provenance-based Intrusion Detection System Against Graph Manipulation Attacks
MirGuard: Towards a Robust Provenance-based Intrusion Detection System Against Graph Manipulation Attacks
Anyuan Sang
Lu Zhou
Li Yang
Junbo Jia
Huipeng Yang
Pengbin Feng
Jianfeng Ma
AAML
166
0
0
14 Aug 2025
LMDG: Advancing Lateral Movement Detection Through High-Fidelity Dataset Generation
LMDG: Advancing Lateral Movement Detection Through High-Fidelity Dataset Generation
Anas Mabrouk
Mohamed Hatem
M. Mamun
Sherif Saad
216
1
0
04 Aug 2025
PROVCREATOR: Synthesizing Complex Heterogenous Graphs with Node and Edge Attributes
PROVCREATOR: Synthesizing Complex Heterogenous Graphs with Node and Edge Attributes
Tianhao Wang
Simon Klancher
Kunal Mukherjee
Josh Wiedemeier
Feng Chen
Murat Kantarcioglu
Kangkook Jee
215
3
0
28 Jul 2025
SmartGuard: Leveraging Large Language Models for Network Attack Detection through Audit Log Analysis and Summarization
SmartGuard: Leveraging Large Language Models for Network Attack Detection through Audit Log Analysis and Summarization
Hao Zhang
Shuo Shao
Song Li
Zhenyu Zhong
Yan Liu
Zhan Qin
321
2
0
20 Jun 2025
ContextBuddy: AI-Enhanced Contextual Insights for Security Alert Investigation (Applied to Intrusion Detection)
ContextBuddy: AI-Enhanced Contextual Insights for Security Alert Investigation (Applied to Intrusion Detection)
Ronal Singh
Mohan Baruwal Chhetri
Surya Nepal
Cécile Paris
268
5
0
11 Jun 2025
No Data? No Problem: Synthesizing Security Graphs for Better Intrusion Detection
No Data? No Problem: Synthesizing Security Graphs for Better Intrusion Detection
Yi Huang
Wajih UI Hassan
Yao Guo
Xiangqun Chen
Ding Li
Wajih Ul Hassan
302
0
0
06 Jun 2025
TriPSS: A Tri-Modal Keyframe Extraction Framework Using Perceptual, Structural, and Semantic Representations
TriPSS: A Tri-Modal Keyframe Extraction Framework Using Perceptual, Structural, and Semantic Representations
Mert Can Cakmak
Nitin Agarwal
Diwash Poudel
288
0
0
03 Jun 2025
Automated Alert Classification and Triage (AACT): An Intelligent System for the Prioritisation of Cybersecurity Alerts
Automated Alert Classification and Triage (AACT): An Intelligent System for the Prioritisation of Cybersecurity Alerts
Melissa Turcotte
François Labrèche
Serge-Olivier Paquette
215
7
0
14 May 2025
Deep Learning-based Intrusion Detection Systems: A Survey
Deep Learning-based Intrusion Detection Systems: A Survey
Zhiwei Xu
Yujuan Wu
Shiheng Wang
Jiabao Gao
Tian Qiu
Ziqi Wang
Hai Wan
Xibin Zhao
421
22
0
10 Apr 2025
A Case for Network-wide Orchestration of Host-based Intrusion Detection and Response
A Case for Network-wide Orchestration of Host-based Intrusion Detection and Response
Mark Timmons
Daniel Lukaszewski
Geoffrey Xie
133
1
0
08 Apr 2025
UAV Resilience Against Stealthy Attacks
UAV Resilience Against Stealthy AttacksInternational Conference on Unmanned Aircraft Systems (ICUAS), 2025
Arthur Amorim
Max Taylor
Trevor Kann
Gary T. Leavens
William L. Harrison
Lance Joneckis
AAML
294
3
0
21 Mar 2025
OMNISEC: LLM-Driven Provenance-based Intrusion Detection via Retrieval-Augmented Behavior Prompting
OMNISEC: LLM-Driven Provenance-based Intrusion Detection via Retrieval-Augmented Behavior Prompting
Wenrui Cheng
Tiantian Zhu
Chunlin Xiong
Haofei Sun
Zijun Wang
Shunan Jing
Mingqi Lv
355
0
0
05 Mar 2025
TFLAG:Towards Practical APT Detection via Deviation-Aware Learning on Temporal Provenance Graph
TFLAG:Towards Practical APT Detection via Deviation-Aware Learning on Temporal Provenance Graph
Wenhan Jiang
Tingting Chai
Hongri Liu
Kai Wang
Hongke Zhang
354
0
0
13 Jan 2025
CONTINUUM: Detecting APT Attacks through Spatial-Temporal Graph Neural Networks
CONTINUUM: Detecting APT Attacks through Spatial-Temporal Graph Neural Networks
Atmane Ayoub Mansour Bahar
Kamel Soaid Ferrahi
Mohamed-Lamine Messai
H. Seba
Karima Amrouche
419
6
0
08 Jan 2025
DEHYDRATOR: Enhancing Provenance Graph Storage via Hierarchical Encoding and Sequence Generation
DEHYDRATOR: Enhancing Provenance Graph Storage via Hierarchical Encoding and Sequence GenerationIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2024
J. Ying
Tiantian Zhu
Mingqi Lv
Tieming Chen
206
0
0
03 Jan 2025
METANOIA: A Lifelong Intrusion Detection and Investigation System for Mitigating Concept Drift
METANOIA: A Lifelong Intrusion Detection and Investigation System for Mitigating Concept Drift
J. Ying
Tiantian Zhu
Aohan Zheng
Tieming Chen
Mingqi Lv
Yan Chen
CLLAAML
322
1
0
31 Dec 2024
LESS: Efficient Log Storage System Based on Learned Model and Minimum
  Attribute Tree
LESS: Efficient Log Storage System Based on Learned Model and Minimum Attribute Tree
Zhiyang Cheng
Zizhen Zhu
Haoran Dang
Hai Wan
Xibin Zhao
203
0
0
26 Nov 2024
SAGA: Synthetic Audit Log Generation for APT Campaigns
SAGA: Synthetic Audit Log Generation for APT Campaigns
Yi-Ting Huang
Y. Guo
Yue Yang
Guo-Wei Wong
Yu-Zih Jheng
Yeali S. Sun
Jessemyn Modini
Timothy Lynar
M. Chen
301
5
0
20 Nov 2024
Winemaking: Extracting Essential Insights for Efficient Threat Detection
  in Audit Logs
Winemaking: Extracting Essential Insights for Efficient Threat Detection in Audit Logs
Weiheng Wu
Wei Qiao
Wenhao Yan
Bo-Sian Jiang
Yuling Liu
Baoxu Liu
Zhigang Lu
JunRong Liu
333
0
0
05 Nov 2024
Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning
Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning
Wei Qiao
Yebo Feng
Teng Li
Zijian Zhang
Yulong Shen
Zhuo Ma
Yulong Shen
1.1K
8
0
23 Oct 2024
CRUcialG: Reconstruct Integrated Attack Scenario Graphs by Cyber Threat
  Intelligence Reports
CRUcialG: Reconstruct Integrated Attack Scenario Graphs by Cyber Threat Intelligence ReportsIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2024
Wenrui Cheng
Tiantian Zhu
Tieming Chen
Qixuan Yuan
J. Ying
Hongmei Li
Chunlin Xiong
Mingda Li
Mingqi Lv
Yan Chen
385
7
0
15 Oct 2024
Tweezers: A Framework for Security Event Detection via Event
  Attribution-centric Tweet Embedding
Tweezers: A Framework for Security Event Detection via Event Attribution-centric Tweet EmbeddingNetwork and Distributed System Security Symposium (NDSS), 2024
Jian Cui
Hanna Kim
Eugene Jang
Dayeon Yim
Kicheol Kim
Yongjae Lee
Jin-Woo Chung
Seungwon Shin
Xiaojing Liao
335
4
0
12 Sep 2024
The HitchHiker's Guide to High-Assurance System Observability Protection
  with Efficient Permission Switches
The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission SwitchesConference on Computer and Communications Security (CCS), 2024
Chuqi Zhang
Jun Zeng
Yiming Zhang
Adil Ahmad
Fengwei Zhang
Hai Jin
Zhenkai Liang
281
10
0
06 Sep 2024
Unintentional Security Flaws in Code: Automated Defense via Root Cause
  Analysis
Unintentional Security Flaws in Code: Automated Defense via Root Cause Analysis
Nafis Tanveer Islam
Mazal Bethany
Dylan Manuel
Murtuza Jadliwala
Peyman Najafirad
279
0
0
30 Aug 2024
EagleEye: Attention to Unveil Malicious Event Sequences from Provenance
  Graphs
EagleEye: Attention to Unveil Malicious Event Sequences from Provenance GraphsAPWG Symposium on Electronic Crime Research (APWG eCrime), 2024
Philipp Gysel
Candid Wuest
Kenneth Nwafor
Otakar Jašek
Andrey Ustyuzhanin
D. Divakaran
298
3
0
17 Aug 2024
HADES: Detecting Active Directory Attacks via Whole Network Provenance
  Analytics
HADES: Detecting Active Directory Attacks via Whole Network Provenance Analytics
Qi Liu
Kaibin Bao
Wajih Ul Hassan
V. Hagenmeyer
AAML
166
6
0
26 Jul 2024
Accurate and Scalable Detection and Investigation of Cyber Persistence
  Threats
Accurate and Scalable Detection and Investigation of Cyber Persistence Threats
Qi Liu
Muhammad Shoaib
M. U. Rehman
Kaibin Bao
V. Hagenmeyer
Wajih Ul Hassan
294
8
0
26 Jul 2024
CICAPT-IIOT: A provenance-based APT attack dataset for IIoT environment
CICAPT-IIOT: A provenance-based APT attack dataset for IIoT environment
Erfan Ghiasvand
Suprio Ray
S. Iqbal
Sajjad Dadkhah
Ali A. Ghorbani
281
24
0
15 Jul 2024
Hack Me If You Can: Aggregating AutoEncoders for Countering Persistent
  Access Threats Within Highly Imbalanced Data
Hack Me If You Can: Aggregating AutoEncoders for Countering Persistent Access Threats Within Highly Imbalanced Data
Sidahmed Benabderrahmane
Ngoc Hoang
Petko Valtchev
James Cheney
Talal Rahwan
211
12
0
27 Jun 2024
P3GNN: A Privacy-Preserving Provenance Graph-Based Model for APT
  Detection in Software Defined Networking
P3GNN: A Privacy-Preserving Provenance Graph-Based Model for APT Detection in Software Defined Networking
Hedyeh Nazari
Abbas Yazdinejad
Ali Dehghantanha
Fattane Zarrinkalam
Gautam Srivastava
329
11
0
17 Jun 2024
LaMOT: Language-Guided Multi-Object Tracking
LaMOT: Language-Guided Multi-Object Tracking
Yunhao Li
Xiaoqiong Liu
Luke Liu
Heng Fan
Libo Zhang
VOT
355
5
0
12 Jun 2024
RAPID: Robust APT Detection and Investigation Using Context-Aware Deep
  Learning
RAPID: Robust APT Detection and Investigation Using Context-Aware Deep LearningComputer Networks (CN), 2024
Yonatan Amaru
Prasanna N. Wudali
Yuval Elovici
A. Shabtai
182
7
0
08 Jun 2024
Detecting Complex Multi-step Attacks with Explainable Graph Neural
  Network
Detecting Complex Multi-step Attacks with Explainable Graph Neural Network
Wei Liu
Peng Gao
Haotian Zhang
Kejian Li
Weiyong Yang
Xingshen Wei
Shuji Wu
AAML
404
4
0
18 May 2024
The MESA Security Model 2.0: A Dynamic Framework for Mitigating Stealth
  Data Exfiltration
The MESA Security Model 2.0: A Dynamic Framework for Mitigating Stealth Data Exfiltration
Sanjeev Pratap Singh
Naveed Afzal
250
5
0
17 May 2024
Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks
  in Real-time through Cyber Threat Intelligence Reports
Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks in Real-time through Cyber Threat Intelligence ReportsIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2024
Tiantian Zhu
Jie Ying
Tieming Chen
Chunlin Xiong
Wenrui Cheng
Qixuan Yuan
Aohan Zheng
Mingqi Lv
Yan Chen
254
5
0
05 May 2024
SPARSE: Semantic Tracking and Path Analysis for Attack Investigation in
  Real-time
SPARSE: Semantic Tracking and Path Analysis for Attack Investigation in Real-timeIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2024
Jie Ying
Tiantian Zhu
Wenrui Cheng
Qixuan Yuan
Mingjun Ma
Chunlin Xiong
Tieming Chen
Mingqi Lv
Yan Chen
270
3
0
04 May 2024
After the Breach: Incident Response within Enterprises
After the Breach: Incident Response within Enterprises
Sumanth Rao
262
0
0
30 Apr 2024
Incorporating Gradients to Rules: Towards Lightweight, Adaptive
  Provenance-based Intrusion Detection
Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection
Lingzhi Wang
Xiangmin Shen
Weijian Li
Zhenyuan Li
R. Sekar
Han Liu
Yan Chen
AAML
305
18
0
23 Apr 2024
LTRDetector: Exploring Long-Term Relationship for Advanced Persistent
  Threats Detection
LTRDetector: Exploring Long-Term Relationship for Advanced Persistent Threats Detection
Xiaoxiao Liu
Fan Xu
Nan Wang
Qinxin Zhao
Dalin Zhang
Xibin Zhao
Jiqiang Liu
305
2
0
04 Apr 2024
Beyond MOT: Semantic Multi-Object Tracking
Beyond MOT: Semantic Multi-Object TrackingEuropean Conference on Computer Vision (ECCV), 2024
Yunhao Li
Hao Wang
Xue Ma
Jiali Yao
Shaohua Dong
Heng Fan
Libo Zhang
VOT
442
20
0
08 Mar 2024
TREC: APT Tactic / Technique Recognition via Few-Shot Provenance
  Subgraph Learning
TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning
Mingqi Lv
HongZhe Gao
Xuebo Qiu
Tieming Chen
Tiantian Zhu
243
30
0
23 Feb 2024
Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis
  of EDR Performance in Real-World Environments
Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World EnvironmentsACM Asia Conference on Computer and Communications Security (AsiaCCS), 2024
Xiangmin Shen
Zhenyuan Li
Graham Burleigh
Lingzhi Wang
Yan Chen
234
10
0
29 Jan 2024
12
Next
Page 1 of 2