Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection L Wang, X Shen, W Li, Z Li, R Sekar, H Liu, Y Chen arXiv preprint arXiv:2404.14720, 2024 | | 2024 |
TAGS: Real-time Intrusion Detection with Tag-Propagation-based Provenance Graph Alignment on Streaming Events Z Li, Y Wei, X Shen, L Wang, Y Chen, H Xu, S Ji, F Zhang arXiv preprint arXiv:2403.12541, 2024 | | 2024 |
Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments X Shen, Z Li, G Burleigh, L Wang, Y Chen arXiv preprint arXiv:2401.15878, 2024 | | 2024 |
Paris: A Practical, Adaptive Trace-Fetching and Real-Time Malicious Behavior Detection System J Wang, L Wang, Z Li, H Yu, X Shen, Y Chen Adaptive Trace-Fetching and Real-Time Malicious Behavior Detection System, 0 | | |