Follow
Sadegh Momeni Milajerdi
Sadegh Momeni Milajerdi
Verified email at google.com
Title
Cited by
Cited by
Year
HOLMES: real-time APT detection through correlation of suspicious information flows
SM Milajerdi, R Gjomemo, B Eshete, R Sekar, VN Venkatakrishnan
IEEE Symposium on Security and Privacy (S&P), 2018
5542018
Fast Memory-efficient Anomaly Detection in Streaming Heterogeneous Graphs
E Manzoor, S M. Milajerdi, L Akoglu
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge …, 2016
2972016
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
MN Hossain, SM Milajerdi, J Wang, B Eshete, R Gjomemo, R Sekar, ...
26th USENIX Security Symposium (USENIX Security 17), 487--504, 2017
2912017
POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting
SM Milajerdi, B Eshete, R Gjomemo, VN Venkatakrishnan
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2019
2512019
Propatrol: Attack investigation via extracted high-level tasks
S M. Milajerdi, B Eshete, R Gjomemo, VN Venkatakrishnan
Information Systems Security: 14th International Conference, ICISS 2018 …, 2018
302018
Attack analysis results for adversarial engagement 1 of the darpa transparent computing program
B Eshete, R Gjomemo, MN Hossain, S Momeni, R Sekar, S Stoller, ...
arXiv preprint arXiv:1610.06936, 2016
102016
A composite-metric based path selection technique for the Tor anonymity network
SM Milajerdi, M Kharrazi
Journal of Systems and Software 103, 53-61, 2015
102015
Layered analysis for network security risk detection
SM Milajerdi, MH Jakubowski, J Parikh
US Patent 11,416,608, 2022
32022
System and method associated with expedient detection and reconstruction of cyber events in a compact scenario representation using provenance tags and customizable policy
R Sekar, J Wang, MN Hossain, SM Milajerdi, B Eshete, R Gjomemo, ...
US Patent 11,601,442, 2023
22023
Facade: High-Precision Insider Threat Detection Using Deep Contextual Anomaly Detection
A Kantchelian, C Neo, R Stevens, H Kim, Z Fu, S Momeni, B Huber, ...
arXiv preprint arXiv:2412.06700, 2024
2024
Threat Detection using Information Flow Analysis on Kernel Audit Logs
SM Milajerdi
University of Illinois at Chicago, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–11