Completed
Previous Approaches using Audit Records
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
ShadeWatcher: Recommendation-Guided Cyber Threat Analysis Using System Audit Records
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Cyber Threats Are Everywhere
- 3 Analyze Cyber Threat using System Auditing
- 4 Previous Approaches using Audit Records
- 5 Recommendation as a Similar Problem
- 6 Recommendation-guided Cyber Threat Analysis
- 7 Knowledge Graph Builder (cont.)
- 8 First-order Connectivity Modeling
- 9 Higher-order Connectivity Modeling
- 10 Learning to Cyber Threat Analysis
- 11 Evaluation
- 12 Effectiveness in Cyber Threat Detection
- 13 Study of Recommendation-guided Analysis
- 14 System Efficiency
- 15 Conclusion