ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2502.02342
  4. Cited By
SHIELD: APT Detection and Intelligent Explanation Using LLM

SHIELD: APT Detection and Intelligent Explanation Using LLM

4 February 2025
Parth Atulbhai Gandhi
Prasanna N. Wudali
Yonatan Amaru
Yuval Elovici
A. Shabtai
    AAML
ArXivPDFHTML

Papers citing "SHIELD: APT Detection and Intelligent Explanation Using LLM"

9 / 9 papers shown
Title
AI-Driven Guided Response for Security Operation Centers with Microsoft
  Copilot for Security
AI-Driven Guided Response for Security Operation Centers with Microsoft Copilot for Security
Scott Freitas
Jovan Kalajdjieski
Amir Gharib
Robert McCann
20
5
0
12 Jul 2024
NODLINK: An Online System for Fine-Grained APT Attack Detection and
  Investigation
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
Shaofei Li
Feng Dong
Xusheng Xiao
Haoyu Wang
Fei Shao
Jiedong Chen
Yao Guo
Xiangqun Chen
Ding Li
71
21
0
04 Nov 2023
MAGIC: Detecting Advanced Persistent Threats via Masked Graph
  Representation Learning
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning
Zian Jia
Yun Xiong
Yuhong Nan
Yao Zhang
Jinjing Zhao
Mi Wen
64
22
0
15 Oct 2023
Kairos: Practical Intrusion Detection and Investigation using
  Whole-system Provenance
Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance
Zijun Cheng
Qiujian Lv
Jinyuan Liang
Yan Wang
Degang Sun
Thomas Pasquier
Xueyuan Han
52
36
0
09 Aug 2023
LAnoBERT: System Log Anomaly Detection based on BERT Masked Language
  Model
LAnoBERT: System Log Anomaly Detection based on BERT Masked Language Model
Yukyung Lee
Jina Kim
Pilsung Kang
31
83
0
18 Nov 2021
threaTrace: Detecting and Tracing Host-based Threats in Node Level
  Through Provenance Graph Learning
threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Su Wang
Zhiliang Wang
Tao Zhou
Xia Yin
Dongqi Han
Han Zhang
Hongbin Sun
Xingang Shi
Jiahai Yang
61
73
0
08 Nov 2021
LogBERT: Log Anomaly Detection via BERT
LogBERT: Log Anomaly Detection via BERT
Haixuan Guo
Shuhan Yuan
Xintao Wu
71
221
0
07 Mar 2021
HOLMES: Real-time APT Detection through Correlation of Suspicious
  Information Flows
HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows
Sadegh M. Milajerdi
Rigel Gjomemo
Birhanu Eshete
R. Sekar
V. Venkatakrishnan
42
398
0
03 Oct 2018
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
M. Hossain
Sadegh M. Milajerdi
Junao Wang
Birhanu Eshete
Rigel Gjomemo
R. Sekar
Scott D. Stoller
V. Venkatakrishnan
38
219
0
06 Jan 2018
1