ProblemChild: Discovering Anomalous Patterns based on Parent-Child Process Relationships.
暂无分享,去创建一个
[1] Raid Saabni,et al. Real-Time Segmentation of On-Line Handwritten Arabic Script , 2014, 2014 14th International Conference on Frontiers in Handwriting Recognition.
[2] Fei Wang,et al. HERCULE: attack story reconstruction via community discovery on correlated log graph , 2016, ACSAC.
[3] Naren Ramakrishnan,et al. Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths , 2015, CCS.
[4] Jean-Loup Guillaume,et al. Fast unfolding of communities in large networks , 2008, 0803.0476.
[5] Guy Hadash,et al. Estimate and Replace: A Novel Approach to Integrating Deep Neural Networks with Existing Applications , 2018, ArXiv.
[6] Raid Saabni,et al. Fast classification of handwritten on-line Arabic characters , 2014, 2014 6th International Conference of Soft Computing and Pattern Recognition (SoCPaR).
[7] V. N. Venkatakrishnan,et al. ProPatrol: Attack Investigation via Extracted High-Level Tasks , 2018, ICISS.
[8] Xiangyu Zhang,et al. ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting , 2016, NDSS.
[9] Tianqi Chen,et al. XGBoost: A Scalable Tree Boosting System , 2016, KDD.
[10] Ashish Gehani,et al. SPADE: Support for Provenance Auditing in Distributed Environments , 2012, Middleware.
[11] Ding Li,et al. NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage , 2019, NDSS.
[12] V. N. Venkatakrishnan,et al. HOLMES: Real-Time APT Detection through Correlation of Suspicious Information Flows , 2018, 2019 IEEE Symposium on Security and Privacy (SP).