ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2402.12252
  4. Cited By
An Interview Study on Third-Party Cyber Threat Hunting Processes in the
  U.S. Department of Homeland Security

An Interview Study on Third-Party Cyber Threat Hunting Processes in the U.S. Department of Homeland Security

19 February 2024
William P. Maxam
James C. Davis
ArXivPDFHTML

Papers citing "An Interview Study on Third-Party Cyber Threat Hunting Processes in the U.S. Department of Homeland Security"

6 / 6 papers shown
Title
Fuzzy to Clear: Elucidating the Threat Hunter Cognitive Process and Cognitive Support Needs
Fuzzy to Clear: Elucidating the Threat Hunter Cognitive Process and Cognitive Support Needs
Alessandra Maciel Paz Milani
Arty Starr
Samantha Hill
Callum Curtis
Norman Anderson
David Moreno-Lumbreras
Margaret-Anne D. Storey
42
0
0
08 Aug 2024
An Industry Interview Study of Software Signing for Supply Chain Security
An Industry Interview Study of Software Signing for Supply Chain Security
Kelechi G. Kalu
Tanya Singla
C. Okafor
Santiago Torres-Arias
James C. Davis
85
7
0
12 Jun 2024
Automating Cyber Threat Hunting Using NLP, Automated Query Generation,
  and Genetic Perturbation
Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation
P. Karuna
Erik Hemberg
Una-May O’Reilly
Nick Rutar
61
11
0
23 Apr 2021
Evidential Cyber Threat Hunting
Evidential Cyber Threat Hunting
F. Araujo
Dhilung Kirat
Xiaokui Shu
Teryl Taylor
Jiyong Jang
27
5
0
21 Apr 2021
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
Peng Gao
Fei Shao
Xiaoyuan Liu
Xusheng Xiao
Zheng Qin
Fengyuan Xu
Prateek Mittal
Sanjeev R. Kulkarni
D. Song
47
87
0
26 Oct 2020
POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber
  Threat Hunting
POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting
Sadegh M. Milajerdi
Birhanu Eshete
Rigel Gjomemo
V. Venkatakrishnan
25
206
0
30 Sep 2019
1