R Ahmad, HY Jung, Y Nakamura, T Malik - Proceedings of the 33rd ACM …, 2024 - dl.acm.org
Several security and workflow applications require provenance information at the operating system level for diagnostics. The resulting provenance traces are often more informative if …
J Nyyssölä, M Mäntylä - 2024 IEEE 24th International …, 2024 - ieeexplore.ieee.org
Software log analysis can be laborious and time consuming. Time and labeled data are usually lacking in industrial settings. This paper studies unsupervised and time efficient …
Tracing, a technique essential for unraveling the complexities of computer systems' behavior, involves the organized collection of low-level events, enabling anomaly …
D Namiot, E Ilyushin - International Journal of Open Information …, 2024 - injoit.ru
In this article, we examine in detail the technical aspects of searching (classifying) malicious software using machine (deep) learning. We consider both a classic example of …