Citation |
Title |
[Anderson'72b] |
Computer Security Technology Planning Study, Volume 2 |
[Anderson'80] | Computer Security Threat Modeling and Surveillance |
[TSSEC'85] | Trusted Computer System Evaluation Criteria |
[TSSEC'88] | A Guide to Understanding Audit in Trusted Systems |
[Sebring'88] | Expert Systems in Intrusion Detection: A Case Study |
[Seiden'90] | The auditing facility for a VMM security kernel |
[Hofmeyr'98] | Intrusion Detection Using Sequences of System Calls |
[Du'16] | DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning |
[Ede'22] | DeepCASE: Semi-Supervised Contextual Analysis of Security Events |
[Shen'18] | Tiresias: Predicting Security Events Through Deep Learning |
[Alahmadi'22] | 99% False Positives: A Qualitative Study of SOC Analysts' Perspectives on Security Alarms |
[Kokulu'19] | Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues |
[Stevens'18] | The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level |
[Hielscher'23] | Lacking the Tools and Support to Fix Friction: Results from an Interview Study with Security Managers |
[Mink'23] | Everybody’s Got ML, Tell Me What Else You Have: Practitioners’ Perception of ML-Based Security Tools and Explanations |
[Kersten'23] | Give Me Structure': Synthesis and Evaluation of a (Network) Threat Analysis Process Supporting Tier 1 Investigations in a Security Operation Center |
[Schlette'24] | Do You Play It by the Books? A Study on Incident Response Playbooks and Influencing Factors |
[Vermeer'22] | Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS Rules |
[Shreeve'23] | Making Sense of the Unknown: How Managers Make Cyber Security Decisions |
[Woods'23] | Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys |
[Arce'24] | Economics of incident response panels in cyber insurance |
[Gumusel'24] | Understanding Legal Professionals’ Practices and Expectations in Data Breach Incident Reporting |
[Kasturi'20] | TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks |
[Jin'23] | Sharing cyber threat intelligence: Does it really help? |
[Li'22] | AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports |
[Bouwman'22] | Helping hands: Measuring the impact of a large threat intelligence sharing community |
[Hassan'20] | Tactical Provenance Analysis for Endpoint Detection and Response Systems |
[Kwon'21] | C^2SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis |
[Fang'22] | Back-Propagating System Dependency Impact for Attack Investigation |
[Milajerdi'21] | POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting |
[Xu'22] | DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation |
[Ding'23] | AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts |
[Zeng'21] | WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics |
[Alsaheel'21] | ATLAS: A Sequence-based Learning Approach for Attack Investigation |
[Jia'24] | MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning |
[Goyal'23] | Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems |
[Zeng'22] | ShadeWatcher: Recommendation-guided Cyber Threat Analysis using System Audit Records |
[Yang'23] | PROGRAPHER: An Anomaly Detection System based on Provenance Graph Embedding |
[Wang'20] | You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis |
[Cheng'24] | KAIROS: Practical Intrusion Detection and Investigation using Whole-system Provenance |
[Rehman'24] | FLASH: A Comprehensive Approach to Intrusion Detection via Provenance Graph Representation Learning |
[Goyal'24] | R-CAID: Embedding Root Cause Analysis within Provenance-based Intrusion Detection |
[Li'24] | NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation |
[Uetz'24] | You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks |
[Jing'23] | Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation |
[Gandhi'23] | Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability |
[Paccagnella'20] | Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks |