A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence.
Peng GaoFei ShaoXiaoyuan LiuXusheng XiaoHaoyuan LiuZheng QinFengyuan XuPrateek MittalSanjeev R. KulkarniDawn SongPublished in: ICDE (2021)
Keyphrases
- computer systems
- cyber crime
- cyber attacks
- computer security
- cyber security
- operating system
- data processing
- human beings
- countermeasures
- hardware and software
- computing systems
- information systems
- communication systems
- information processing systems
- high end
- computer networks
- intrusion detection system
- computer architecture
- artificial intelligence
- software developers
- crime investigation
- privacy issues
- computer technology
- fault management
- insider threat
- national security
- data sets
- computer hardware
- real world
- data mining
- intelligence analysts
- machine learning
- databases