Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2006.01722
Cited By
Threat Detection and Investigation with System-level Provenance Graphs: A Survey
2 June 2020
Zhenyuan Li
Qi Alfred Chen
Runqing Yang
Yan Chen
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Threat Detection and Investigation with System-level Provenance Graphs: A Survey"
5 / 5 papers shown
Title
UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats
Xueyuan Han
Thomas Pasquier
Adam Bates
James W. Mickens
Margo Seltzer
46
271
0
06 Jan 2020
Generalizing from a Few Examples: A Survey on Few-Shot Learning
Yaqing Wang
Quanming Yao
James T. Kwok
L. Ni
66
1,802
0
10 Apr 2019
HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows
Sadegh M. Milajerdi
Rigel Gjomemo
Birhanu Eshete
R. Sekar
V. Venkatakrishnan
22
393
0
03 Oct 2018
Provenance-based Intrusion Detection: Opportunities and Challenges
Xueyuan Han
Thomas Pasquier
Margo Seltzer
15
45
0
04 Jun 2018
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
M. Hossain
Sadegh M. Milajerdi
Junao Wang
Birhanu Eshete
Rigel Gjomemo
R. Sekar
Scott D. Stoller
V. Venkatakrishnan
20
217
0
06 Jan 2018
1