Login / Signup

POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting.

Sadegh M. MilajerdiBirhanu EsheteRigel GjomemoV. N. Venkatakrishnan
Published in: CCS (2019)
Keyphrases
  • countermeasures
  • databases
  • cyber crime
  • kernel function
  • machine learning
  • image registration
  • intrusion detection
  • kernel methods
  • human behavior
  • kernel matrix
  • quality assurance
  • cyber security