Главная
Study mode:
on
1
Intro
2
Cyber Threats Are Everywhere
3
Analyze Cyber Threat using System Auditing
4
Previous Approaches using Audit Records
5
Recommendation as a Similar Problem
6
Recommendation-guided Cyber Threat Analysis
7
Knowledge Graph Builder (cont.)
8
First-order Connectivity Modeling
9
Higher-order Connectivity Modeling
10
Learning to Cyber Threat Analysis
11
Evaluation
12
Effectiveness in Cyber Threat Detection
13
Study of Recommendation-guided Analysis
14
System Efficiency
15
Conclusion
Description:
Explore a novel approach to cyber threat analysis in this 21-minute IEEE conference talk. Delve into the ShadeWatcher system, which utilizes recommendation-guided techniques and system audit records to enhance threat detection. Learn about knowledge graph building, connectivity modeling, and machine learning applications in cybersecurity. Examine the effectiveness and efficiency of this innovative method through comprehensive evaluations and case studies.

ShadeWatcher: Recommendation-Guided Cyber Threat Analysis Using System Audit Records

IEEE
Add to list
0:00 / 0:00