Главная
Study mode:
on
1
Introduction
2
What is Machine Learning
3
Limitations of Machine Learning
4
Continuous Learning
5
Knowledge Graphs
6
Generating a Knowledge Graph
7
Adding Context
8
Provenance Reasoning
Description:
Explore the critical shift towards contextual security in threat intelligence through this 23-minute conference talk from USENIX Enigma 2022. Delve into the challenges of automating trustworthy explanations of cyberattacks, examining the limitations of current machine learning-based security solutions and how contextual approaches can address them. Learn about the importance of deep system knowledge, real-time environmental data, and effective communication in cybersecurity. Discover the potential of knowledge graphs in threat intelligence and gain insights into ongoing research on explanation-based security. Understand key concepts such as continuous learning, provenance reasoning, and the generation of contextual knowledge graphs to enhance cybersecurity practices.

Contextual Security: A Critical Shift in Performing Threat Intelligence

USENIX Enigma Conference
Add to list