Sign Up to like & get
recommendations!
0
Published in 2025 at "Symmetry"
DOI: 10.3390/sym17060898
Abstract: Proactively hunting known attack behaviors within system logs, termed threat hunting, is gaining traction in cybersecurity. Existing methods typically rely on constructing a query graph representing known attack patterns and identifying it as a subgraph…
read more here.
Keywords:
seeded graph;
threat hunting;
supervised seeded;
threat ... See more keywords