People
Research
Publications
Contact
Sadegh M. Milajerdi
Latest
Poirot: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting
HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows
ProPatrol: Attack Investigation via Extracted High-Level Tasks
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
Cite
×