Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
A semantic-based correlation approach for detecting hybrid and low-level APTs
Lajevardi, Amir Mohammadzade, Amini, Morteza
Published in Future generation computer systems (01.07.2019)
Published in Future generation computer systems (01.07.2019)
Get full text
Journal Article
Detecting lateral movement: A systematic survey
Smiliotopoulos, Christos, Kambourakis, Georgios, Kolias, Constantinos
Published in Heliyon (29.02.2024)
Published in Heliyon (29.02.2024)
Get full text
Journal Article
TiGNet: Joint entity and relation triplets extraction for APT campaign threat intelligence
You, Yizhe, Jiang, Zhengwei, Zhang, Kai, Feng, Huamin, Jiang, Jun, Yang, Peian
Published in Proceedings of the ... International Conference on Computer Supported Cooperative Work in Design (Online) (08.05.2024)
Published in Proceedings of the ... International Conference on Computer Supported Cooperative Work in Design (Online) (08.05.2024)
Get full text
Conference Proceeding
Comparative study of recent MEA malware phylogeny
Moubarak, Joanna, Chamoun, Maroun, Filiol, Eric
Published in 2017 2nd International Conference on Computer and Communication Systems (ICCCS) (01.07.2017)
Published in 2017 2nd International Conference on Computer and Communication Systems (ICCCS) (01.07.2017)
Get full text
Conference Proceeding
Making a case for high-bandwidth monitoring - a use case for analysis on the wire
DePhillips, Michael, Katramatos, Dimitrios, Bhattacharyya, Shilpi
Published in 2017 New York Scientific Data Summit (NYSDS) (01.08.2017)
Published in 2017 New York Scientific Data Summit (NYSDS) (01.08.2017)
Get full text
Conference Proceeding
Advanced Persistent Threats Are The Next IT Security Battleground In UK Public Sector, Reveals Gigamon iGov Survey
Published in M2 Presswire
(12.07.2016)
Get full text
Newsletter
Proposed Framework for Network Lateral Movement Detection Based On User Risk Scoring in SIEM
Lah, Airull Azizi Awang, Dziyauddin, Rudzidatul Akmam, Azmi, Marwan Hadri
Published in 2018 2nd International Conference on Telematics and Future Generation Networks (TAFGEN) (01.07.2018)
Published in 2018 2nd International Conference on Telematics and Future Generation Networks (TAFGEN) (01.07.2018)
Get full text
Conference Proceeding
LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering
Li, Jiawei, Zhang, Ru, Liu, Jianyi, Liu, Gongshen
Published in Security and communication networks (27.09.2022)
Published in Security and communication networks (27.09.2022)
Get full text
Journal Article
Unveiling personalized and gamification-based cybersecurity risks within financial institutions
Shahzadi, Amna, Ishaq, Kashif, Nawaz, Naeem A., Rosdi, Fadhilah, Khan, Fawad Ali
Published in PeerJ. Computer science (07.02.2025)
Published in PeerJ. Computer science (07.02.2025)
Get full text
Journal Article
Exponential discounting in security games of timing
Merlevede, Jonathan, Johnson, Benjamin, Grossklags, Jens, Holvoet, Tom
Published in Journal of cybersecurity (Oxford) (01.01.2021)
Published in Journal of cybersecurity (Oxford) (01.01.2021)
Get full text
Journal Article
Cyber Range for Research-Inspired Learning of "Attack Defense by Pretense" Principle and Practice
Vekaria, Komal Bhupendra, Calyam, Prasad, Wang, Songjie, Payyavula, Ramya, Rockey, Matthew, Ahmed, Nafis
Published in IEEE transactions on learning technologies (01.06.2021)
Published in IEEE transactions on learning technologies (01.06.2021)
Get full text
Journal Article