Login / Signup
EXTRACTOR: Extracting Attack Behavior from Threat Reports.
Kiavash Satvat
Rigel Gjomemo
V. N. Venkatakrishnan
Published in:
CoRR (2021)
Keyphrases
</>
countermeasures
real time
neural network
anomaly detection
behavior analysis
behavior patterns
malicious attacks