Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2104.08618
Cited By
EXTRACTOR: Extracting Attack Behavior from Threat Reports
17 April 2021
Kiavash Satvat
Rigel Gjomemo
V. Venkatakrishnan
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"EXTRACTOR: Extracting Attack Behavior from Threat Reports"
8 / 8 papers shown
Title
POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting
Sadegh M. Milajerdi
Birhanu Eshete
Rigel Gjomemo
V. Venkatakrishnan
27
207
0
30 Sep 2019
Simple BERT Models for Relation Extraction and Semantic Role Labeling
Peng Shi
Jimmy J. Lin
VLM
68
446
0
10 Apr 2019
BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding
Jacob Devlin
Ming-Wei Chang
Kenton Lee
Kristina Toutanova
VLM
SSL
SSeg
1.8K
95,114
0
11 Oct 2018
Learning Named Entity Tagger using Domain-Specific Dictionary
Jingbo Shang
Liyuan Liu
Xiang Ren
Xiaotao Gu
Teng Ren
Jiawei Han
NoLa
63
211
0
10 Sep 2018
Anaphora and Coreference Resolution: A Review
R. Sukthanker
Soujanya Poria
Min Zhang
Ramkumar Thirunavukarasu
66
172
0
30 May 2018
AllenNLP: A Deep Semantic Natural Language Processing Platform
Matt Gardner
Joel Grus
Mark Neumann
Oyvind Tafjord
Pradeep Dasigi
Nelson F. Liu
Matthew E. Peters
Michael Schmitz
Luke Zettlemoyer
VLM
88
1,282
0
20 Mar 2018
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
M. Hossain
Sadegh M. Milajerdi
Junao Wang
Birhanu Eshete
Rigel Gjomemo
R. Sekar
Scott D. Stoller
V. Venkatakrishnan
40
220
0
06 Jan 2018
Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data
Alina Oprea
Zhou Li
T. Yen
Sang Chin
Sumayah A. Alrwais
63
172
0
18 Nov 2014
1