A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence.
Peng GaoFei ShaoXiaoyuan LiuXusheng XiaoHaoyuan LiuZheng QinFengyuan XuPrateek MittalSanjeev R. KulkarniDawn SongPublished in: CoRR (2021)
Keyphrases
- computer systems
- cyber crime
- cyber attacks
- computer security
- cyber security
- operating system
- countermeasures
- computing systems
- human beings
- data processing
- hardware and software
- information systems
- national security
- computer technology
- computer networks
- high end
- intrusion detection system
- computer architecture
- information processing systems
- crime investigation
- communication systems
- artificial intelligence
- identity theft
- privacy issues
- information security
- computer hardware
- software developers
- information processing
- law enforcement
- critical infrastructure
- intrusion detection
- data analysis
- intelligence analysis
- smart grid
- power system