Tactical provenance analysis for endpoint detection and response systems

WU Hassan, A Bates, D Marino - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Endpoint Detection and Response (EDR) tools provide visibility into sophisticated intrusions
by matching system events against known adversarial behaviors. However, current solutions …

{PROGRAPHER}: An Anomaly Detection System based on Provenance Graph Embedding

F Yang, J Xu, C ** the landscape of government data breaches: A bibliometric analysis of literature from 2006 to 2023
S Hamid, MN Huda - Social Sciences & Humanities Open, 2025 - Elsevier
Data breaches in the government sector are severe threats to cybersecurity and illegal acts
that flagrantly violate security and privacy laws. It undermines public trust in government …

Data provenance

B Glavic - Foundations and Trends® in Databases, 2021 - nowpublishers.com
Data provenance has evolved from a niche topic to a mainstream area of research in
databases and other research communities. This article gives a comprehensive introduction …

A survey on forensics and compliance auditing for critical infrastructure protection

J Henriques, F Caldeira, T Cruz, P Simões - IEEE Access, 2024 - ieeexplore.ieee.org
The broadening dependency and reliance that modern societies have on essential services
provided by Critical Infrastructures is increasing the relevance of their trustworthiness …

Efficient feature selection for static analysis vulnerability prediction

K Filus, P Boryszko, J Domańska, M Siavvas… - Sensors, 2021 - mdpi.com
Common software vulnerabilities can result in severe security breaches, financial losses,
and reputation deterioration and require research effort to improve software security. The …

You are your friends: Detecting malware via guilt-by-association and exempt-by-reputation

P Najafi, W Puenter, F Cheng, C Meinel - Computers & Security, 2024 - Elsevier
With the increase in the prevalence of Security Information and Event Management Systems
(SIEMs) in today's organizations, there is a growing interest in data-driven threat detection …

Understanding and bridging the gap between unsupervised network representation learning and security analytics

J Xu, X Shu, Z Li - 2024 IEEE Symposium on Security and …, 2024 - ieeexplore.ieee.org
Cyber-attacks have become increasingly sophisticated, which also drives the development
of security analytics that produce countermeasures by mining organizational logs, eg …

Increasing Cyber Defense in the Music Education Sector Using Blockchain Zero‐Knowledge Proof Identification

Y Zhang - Computational Intelligence and Neuroscience, 2022 - Wiley Online Library
Music creation and its promotion are encouraged both in music education and through
activities organized in the context of artistic creation as part of the education in question …

Development of Large-Scale Farming Based on Explainable Machine Learning for a Sustainable Rural Economy: The Case of Cyber Risk Analysis to Prevent Costly …

Y Kang - Applied Artificial Intelligence, 2023 - Taylor & Francis
Risk management is essential to every organization's management plan. It is the strategy by
which organizations handle the risks involved with their actions to profit or avoid making …