Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2001.01525
Cited By
UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats
6 January 2020
Xueyuan Han
Thomas Pasquier
Adam Bates
James W. Mickens
Margo Seltzer
Re-assign community
ArXiv
PDF
HTML
Papers citing
"UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats"
25 / 75 papers shown
Title
Ellipsis: Towards Efficient System Auditing for Real-Time Systems
Ayoosh Bansal
Anant Kandikuppa
Chien-Ying Chen
M. Hasan
Adam Bates
Sibin Mohan
14
0
0
04 Aug 2022
Designing a Provenance Analysis for SGX Enclaves
Flavio Toffalini
Mathias Payer
Jianying Zhou
Lorenzo Cavallaro
11
4
0
15 Jun 2022
Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior
Enes Altinisik
Husrev Taha Sencar
Mohamed Nabeel
Issa M. Khalil
Tingyue Yu
19
0
0
12 Jun 2022
Software Updates Strategies: a Quantitative Evaluation against Advanced Persistent Threats
Giorgio Di Tizio
Michele Armellini
Fabio Massacci
AAML
11
9
0
16 May 2022
Flurry: a Fast Framework for Reproducible Multi-layered Provenance Graph Representation Learning
Maya Kapoor
Joshua Melton
Michael Ridenhour
Mahalavanya Sriram
Thomas Moyer
S. Krishnan
20
0
0
05 Mar 2022
ANUBIS: A Provenance Graph-Based Framework for Advanced Persistent Threat Detection
M. Anjum
Shahrear Iqbal
B. Hamelin
13
27
0
21 Dec 2021
APTSHIELD: A Stable, Efficient and Real-time APT Detection System for Linux Hosts
Tiantian Zhu
Jinkai Yu
Tieming Chen
Qixuan Yuan
J. Ying
Jiabo Zhang
Mingqi Lv
Yan Chen
Yuan Fan
Ting Wang
11
26
0
16 Dec 2021
A Heterogeneous Graph Learning Model for Cyber-Attack Detection
Mingqi Lv
Chengyu Dong
Tieming Chen
Tiantian Zhu
Qijie Song
Yuan Fan
AAML
19
4
0
16 Dec 2021
threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Su Wang
Zhiliang Wang
Tao Zhou
Xia Yin
Dongqi Han
Han Zhang
Hongbin Sun
Xingang Shi
Jiahai Yang
37
69
0
08 Nov 2021
Secure Namespaced Kernel Audit for Containers
S. Lim
Bogdan Stelea
Xueyuan Han
Thomas Pasquier
25
17
0
03 Nov 2021
DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
Dongqi Han
Zhiliang Wang
Wenqi Chen
Ying Zhong
Su Wang
Han Zhang
Jiahai Yang
Xingang Shi
Xia Yin
AAML
24
76
0
23 Sep 2021
PassFlow: Guessing Passwords with Generative Flows
Giulio Pagnotta
Dorjan Hitaj
Fabio De Gaspari
L. Mancini
26
13
0
13 May 2021
Evidential Cyber Threat Hunting
F. Araujo
Dhilung Kirat
Xiaokui Shu
Teryl Taylor
Jiyong Jang
6
5
0
21 Apr 2021
Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector
Peilun Wu
Hui Guo
17
4
0
16 Apr 2021
Multi-Stage Attack Detection via Kill Chain State Machines
Florian Wilkens
Felix Ortmann
Steffen Haas
Matthias Vallentin
Mathias Fischer
22
21
0
26 Mar 2021
Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection Research
M. Anjum
Shahrear Iqbal
B. Hamelin
17
30
0
04 Mar 2021
RANK: AI-assisted End-to-End Architecture for Detecting Persistent Attacks in Enterprise Networks
Hazem M. Soliman
Geoff Salmon
Dusan Sovilj
M. Rao
15
8
0
06 Jan 2021
MAAC: Novel Alert Correlation Method To Detect Multi-step Attack
Xiaoyu Wang
Xiaorui Gong
Lei-Ping Yu
Houhua He
AAML
21
20
0
16 Nov 2020
Provenance-Based Interpretation of Multi-Agent Information Analysis
Scott E. Friedman
J. Rye
David Lavergne
D. Thomsen
M. Allen
Kyle Tunis
13
2
0
08 Nov 2020
Provenance-Based Assessment of Plans in Context
Scott E. Friedman
R. Goldman
Richard G. Freedman
U. Kuter
C. Geib
J. Rye
8
1
0
03 Nov 2020
SIGL: Securing Software Installations Through Deep Graph Learning
Xueyuan Han
Xiao Yu
Thomas Pasquier
Ding Li
J. Rhee
James W. Mickens
Margo Seltzer
Haifeng Chen
26
49
0
26 Aug 2020
Categorical anomaly detection in heterogeneous data using minimum description length clustering
James Cheney
Xavier Gombau
Ghita Berrada
Sidahmed Benabderrahmane
9
1
0
14 Jun 2020
Threat Detection and Investigation with System-level Provenance Graphs: A Survey
Zhenyuan Li
Qi Alfred Chen
Runqing Yang
Yan Chen
9
76
0
02 Jun 2020
Xanthus: Push-button Orchestration of Host Provenance Data Collection
Xueyuan Han
James W. Mickens
Ashish Gehani
Margo Seltzer
Thomas Pasquier
12
7
0
10 May 2020
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes
Fabio De Gaspari
Dorjan Hitaj
Giulio Pagnotta
Lorenzo De Carli
L. Mancini
AAML
21
30
0
06 Nov 2019
Previous
1
2