From post

Combating alert fatigue with AlertPro: Context-aware alert prioritization using reinforcement learning for multi-step attack detection.

, , , , , и . Comput. Secur., (февраля 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

State-of-the-Art: Security Competition in Talent Education., , , и . Inscrypt, том 10726 из Lecture Notes in Computer Science, стр. 461-481. Springer, (2017)FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities., , , , , и . USENIX Security Symposium, стр. 781-797. USENIX Association, (2018)PPIDS: A Pyramid-Like Printer Intrusion Detection System Based on ATT&CK Framework., , , , , , и . Inscrypt, том 12020 из Lecture Notes in Computer Science, стр. 277-290. Springer, (2019)Poster: temporal attribute-based encryption in clouds., , , , и . ACM Conference on Computer and Communications Security, стр. 881-884. ACM, (2011)COMRace: Detecting Data Race Vulnerabilities in COM Objects., , , , , , и . USENIX Security Symposium, стр. 3019-3036. USENIX Association, (2022)MAZE: Towards Automated Heap Feng Shui., , , , , и . USENIX Security Symposium, стр. 1647-1664. USENIX Association, (2021)HAEPG: An Automatic Multi-hop Exploitation Generation Framework., , и . DIMVA, том 12223 из Lecture Notes in Computer Science, стр. 89-109. Springer, (2020)From proof-of-concept to exploitable., , , , , и . Cybersecur., 2 (1): 12 (2019)A TOA-Based Geolocation Algorithm Utilizing Convex Combination., , , и . VTC Spring, стр. 1-5. IEEE, (2015)FuncNet: A Euclidean Embedding Approach for Lightweight Cross-platform Binary Recognition., , , и . SecureComm (1), том 304 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 319-337. Springer, (2019)