How does Endpoint Detection use the {MITRE}{ATT&CK} Framework?

A Virkud, MA Inam, A Riddle, J Liu, G Wang… - 33rd USENIX Security …, 2024 - usenix.org
MITRE ATT&CK is an open-source taxonomy of adversary tactics, techniques, and
procedures based on real-world observations. Increasingly, organizations leverage ATT&CK …

Incorporating gradients to rules: Towards lightweight, adaptive provenance-based intrusion detection

L Wang, X Shen, W Li, Z Li, R Sekar, H Liu… - arxiv preprint arxiv …, 2024 - arxiv.org
As cyber attacks grow increasingly sophisticated and stealthy, it becomes more imperative
and challenging to detect intrusion from normal behaviors. Through fine-grained causality …

MITRE ATT&CK Applications in Cybersecurity and The Way Forward

Y Jiang, Q Meng, F Shang, N Oo, LTH Minh… - arxiv preprint arxiv …, 2025 - arxiv.org
The MITRE ATT&CK framework is a widely adopted tool for enhancing cybersecurity,
supporting threat intelligence, incident response, attack modeling, and vulnerability …

Detecting Trajectory of Targeted Attack by Hidden Markov Model

YH Ou, YL Tsai, ZY Wu - 2024 - researchsquare.com
The proliferation of the internet has accelerated information transmission, greatly facilitating
everyday life. However, with the growth of digitalization, cyber attacks have become …