ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2104.08618
  4. Cited By
EXTRACTOR: Extracting Attack Behavior from Threat Reports

EXTRACTOR: Extracting Attack Behavior from Threat Reports

17 April 2021
Kiavash Satvat
Rigel Gjomemo
V. Venkatakrishnan
ArXiv (abs)PDFHTML

Papers citing "EXTRACTOR: Extracting Attack Behavior from Threat Reports"

8 / 8 papers shown
Title
POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber
  Threat Hunting
POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting
Sadegh M. Milajerdi
Birhanu Eshete
Rigel Gjomemo
V. Venkatakrishnan
27
207
0
30 Sep 2019
Simple BERT Models for Relation Extraction and Semantic Role Labeling
Simple BERT Models for Relation Extraction and Semantic Role Labeling
Peng Shi
Jimmy J. Lin
VLM
68
446
0
10 Apr 2019
BERT: Pre-training of Deep Bidirectional Transformers for Language
  Understanding
BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding
Jacob Devlin
Ming-Wei Chang
Kenton Lee
Kristina Toutanova
VLMSSLSSeg
1.8K
95,114
0
11 Oct 2018
Learning Named Entity Tagger using Domain-Specific Dictionary
Learning Named Entity Tagger using Domain-Specific Dictionary
Jingbo Shang
Liyuan Liu
Xiang Ren
Xiaotao Gu
Teng Ren
Jiawei Han
NoLa
63
211
0
10 Sep 2018
Anaphora and Coreference Resolution: A Review
Anaphora and Coreference Resolution: A Review
R. Sukthanker
Soujanya Poria
Min Zhang
Ramkumar Thirunavukarasu
66
172
0
30 May 2018
AllenNLP: A Deep Semantic Natural Language Processing Platform
AllenNLP: A Deep Semantic Natural Language Processing Platform
Matt Gardner
Joel Grus
Mark Neumann
Oyvind Tafjord
Pradeep Dasigi
Nelson F. Liu
Matthew E. Peters
Michael Schmitz
Luke Zettlemoyer
VLM
88
1,282
0
20 Mar 2018
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
M. Hossain
Sadegh M. Milajerdi
Junao Wang
Birhanu Eshete
Rigel Gjomemo
R. Sekar
Scott D. Stoller
V. Venkatakrishnan
40
220
0
06 Jan 2018
Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log
  Data
Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data
Alina Oprea
Zhou Li
T. Yen
Sang Chin
Sumayah A. Alrwais
63
172
0
18 Nov 2014
1