ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2001.01525
  4. Cited By
UNICORN: Runtime Provenance-Based Detector for Advanced Persistent
  Threats

UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats

6 January 2020
Xueyuan Han
Thomas Pasquier
Adam Bates
James W. Mickens
Margo Seltzer
ArXivPDFHTML

Papers citing "UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats"

25 / 75 papers shown
Title
Ellipsis: Towards Efficient System Auditing for Real-Time Systems
Ellipsis: Towards Efficient System Auditing for Real-Time Systems
Ayoosh Bansal
Anant Kandikuppa
Chien-Ying Chen
M. Hasan
Adam Bates
Sibin Mohan
14
0
0
04 Aug 2022
Designing a Provenance Analysis for SGX Enclaves
Designing a Provenance Analysis for SGX Enclaves
Flavio Toffalini
Mathias Payer
Jianying Zhou
Lorenzo Cavallaro
11
4
0
15 Jun 2022
Exploration of Enterprise Server Data to Assess Ease of Modeling System
  Behavior
Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior
Enes Altinisik
Husrev Taha Sencar
Mohamed Nabeel
Issa M. Khalil
Tingyue Yu
19
0
0
12 Jun 2022
Software Updates Strategies: a Quantitative Evaluation against Advanced
  Persistent Threats
Software Updates Strategies: a Quantitative Evaluation against Advanced Persistent Threats
Giorgio Di Tizio
Michele Armellini
Fabio Massacci
AAML
11
9
0
16 May 2022
Flurry: a Fast Framework for Reproducible Multi-layered Provenance Graph
  Representation Learning
Flurry: a Fast Framework for Reproducible Multi-layered Provenance Graph Representation Learning
Maya Kapoor
Joshua Melton
Michael Ridenhour
Mahalavanya Sriram
Thomas Moyer
S. Krishnan
20
0
0
05 Mar 2022
ANUBIS: A Provenance Graph-Based Framework for Advanced Persistent
  Threat Detection
ANUBIS: A Provenance Graph-Based Framework for Advanced Persistent Threat Detection
M. Anjum
Shahrear Iqbal
B. Hamelin
13
27
0
21 Dec 2021
APTSHIELD: A Stable, Efficient and Real-time APT Detection System for
  Linux Hosts
APTSHIELD: A Stable, Efficient and Real-time APT Detection System for Linux Hosts
Tiantian Zhu
Jinkai Yu
Tieming Chen
Qixuan Yuan
J. Ying
Jiabo Zhang
Mingqi Lv
Yan Chen
Yuan Fan
Ting Wang
11
26
0
16 Dec 2021
A Heterogeneous Graph Learning Model for Cyber-Attack Detection
A Heterogeneous Graph Learning Model for Cyber-Attack Detection
Mingqi Lv
Chengyu Dong
Tieming Chen
Tiantian Zhu
Qijie Song
Yuan Fan
AAML
19
4
0
16 Dec 2021
threaTrace: Detecting and Tracing Host-based Threats in Node Level
  Through Provenance Graph Learning
threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Su Wang
Zhiliang Wang
Tao Zhou
Xia Yin
Dongqi Han
Han Zhang
Hongbin Sun
Xingang Shi
Jiahai Yang
37
69
0
08 Nov 2021
Secure Namespaced Kernel Audit for Containers
Secure Namespaced Kernel Audit for Containers
S. Lim
Bogdan Stelea
Xueyuan Han
Thomas Pasquier
25
17
0
03 Nov 2021
DeepAID: Interpreting and Improving Deep Learning-based Anomaly
  Detection in Security Applications
DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
Dongqi Han
Zhiliang Wang
Wenqi Chen
Ying Zhong
Su Wang
Han Zhang
Jiahai Yang
Xingang Shi
Xia Yin
AAML
24
76
0
23 Sep 2021
PassFlow: Guessing Passwords with Generative Flows
PassFlow: Guessing Passwords with Generative Flows
Giulio Pagnotta
Dorjan Hitaj
Fabio De Gaspari
L. Mancini
26
13
0
13 May 2021
Evidential Cyber Threat Hunting
Evidential Cyber Threat Hunting
F. Araujo
Dhilung Kirat
Xiaokui Shu
Teryl Taylor
Jiyong Jang
6
5
0
21 Apr 2021
Holmes: An Efficient and Lightweight Semantic Based Anomalous Email
  Detector
Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector
Peilun Wu
Hui Guo
17
4
0
16 Apr 2021
Multi-Stage Attack Detection via Kill Chain State Machines
Multi-Stage Attack Detection via Kill Chain State Machines
Florian Wilkens
Felix Ortmann
Steffen Haas
Matthias Vallentin
Mathias Fischer
22
21
0
26 Mar 2021
Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat
  Detection Research
Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection Research
M. Anjum
Shahrear Iqbal
B. Hamelin
17
30
0
04 Mar 2021
RANK: AI-assisted End-to-End Architecture for Detecting Persistent
  Attacks in Enterprise Networks
RANK: AI-assisted End-to-End Architecture for Detecting Persistent Attacks in Enterprise Networks
Hazem M. Soliman
Geoff Salmon
Dusan Sovilj
M. Rao
15
8
0
06 Jan 2021
MAAC: Novel Alert Correlation Method To Detect Multi-step Attack
MAAC: Novel Alert Correlation Method To Detect Multi-step Attack
Xiaoyu Wang
Xiaorui Gong
Lei-Ping Yu
Houhua He
AAML
21
20
0
16 Nov 2020
Provenance-Based Interpretation of Multi-Agent Information Analysis
Provenance-Based Interpretation of Multi-Agent Information Analysis
Scott E. Friedman
J. Rye
David Lavergne
D. Thomsen
M. Allen
Kyle Tunis
13
2
0
08 Nov 2020
Provenance-Based Assessment of Plans in Context
Provenance-Based Assessment of Plans in Context
Scott E. Friedman
R. Goldman
Richard G. Freedman
U. Kuter
C. Geib
J. Rye
8
1
0
03 Nov 2020
SIGL: Securing Software Installations Through Deep Graph Learning
SIGL: Securing Software Installations Through Deep Graph Learning
Xueyuan Han
Xiao Yu
Thomas Pasquier
Ding Li
J. Rhee
James W. Mickens
Margo Seltzer
Haifeng Chen
26
49
0
26 Aug 2020
Categorical anomaly detection in heterogeneous data using minimum
  description length clustering
Categorical anomaly detection in heterogeneous data using minimum description length clustering
James Cheney
Xavier Gombau
Ghita Berrada
Sidahmed Benabderrahmane
9
1
0
14 Jun 2020
Threat Detection and Investigation with System-level Provenance Graphs:
  A Survey
Threat Detection and Investigation with System-level Provenance Graphs: A Survey
Zhenyuan Li
Qi Alfred Chen
Runqing Yang
Yan Chen
9
76
0
02 Jun 2020
Xanthus: Push-button Orchestration of Host Provenance Data Collection
Xanthus: Push-button Orchestration of Host Provenance Data Collection
Xueyuan Han
James W. Mickens
Ashish Gehani
Margo Seltzer
Thomas Pasquier
12
7
0
10 May 2020
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes
Fabio De Gaspari
Dorjan Hitaj
Giulio Pagnotta
Lorenzo De Carli
L. Mancini
AAML
21
30
0
06 Nov 2019
Previous
12