Login / Signup
POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting.
Sadegh M. Milajerdi
Birhanu Eshete
Rigel Gjomemo
V. N. Venkatakrishnan
Published in:
CCS (2019)
Keyphrases
</>
countermeasures
databases
cyber crime
kernel function
machine learning
image registration
intrusion detection
kernel methods
human behavior
kernel matrix
quality assurance
cyber security