ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1810.01594
  4. Cited By
HOLMES: Real-time APT Detection through Correlation of Suspicious
  Information Flows
v1v2 (latest)

HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows

3 October 2018
Sadegh M. Milajerdi
Rigel Gjomemo
Birhanu Eshete
R. Sekar
V. Venkatakrishnan
ArXiv (abs)PDFHTML

Papers citing "HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows"

7 / 7 papers shown
Title
Sentient: Multi-Scenario Behavioral Intent Analysis for Advanced Persistent Threat Detection
Sentient: Multi-Scenario Behavioral Intent Analysis for Advanced Persistent Threat Detection
Wenhao Yan
Ning An
Wei Qiao
Weiheng Wu
Bo-Sian Jiang
Yuling Liu
Zhigang Lu
JunRong Liu
121
0
0
10 Feb 2025
Detecting APT Malware Command and Control over HTTP(S) Using Contextual Summaries
Detecting APT Malware Command and Control over HTTP(S) Using Contextual Summaries
Almuthanna Alageel
Sergio Maffeis
Imperial College London
72
2
0
07 Feb 2025
Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning
Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning
Wei Qiao
Yebo Feng
Teng Li
Zijian Zhang
Zhengzi Xu
Zhuo Ma
Yulong Shen
96
0
0
23 Oct 2024
ProPatrol: Attack Investigation via Extracted High-Level Tasks
ProPatrol: Attack Investigation via Extracted High-Level Tasks
Sadegh M. Milajerdi
Birhanu Eshete
Rigel Gjomemo
V. Venkatakrishnan
38
21
0
12 Oct 2018
Runtime Analysis of Whole-System Provenance
Runtime Analysis of Whole-System Provenance
Thomas Pasquier
Xueyuan Han
Thomas Moyer
Adam Bates
O. Hermant
David Eyers
J. Bacon
Margo Seltzer
51
96
0
18 Aug 2018
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
M. Hossain
Sadegh M. Milajerdi
Junao Wang
Birhanu Eshete
Rigel Gjomemo
R. Sekar
Scott D. Stoller
V. Venkatakrishnan
40
220
0
06 Jan 2018
Malicious Behavior Detection using Windows Audit Logs
Malicious Behavior Detection using Windows Audit Logs
Konstantin Berlin
David Slater
Joshua Saxe
53
94
0
13 Jun 2015
1