Unicorn: Runtime provenance-based detector for advanced persistent threats

X Han, T Pasquier, A Bates, J Mickens… - arXiv preprint arXiv …, 2020 - arxiv.org
Advanced Persistent Threats (APTs) are difficult to detect due to their" low-and-slow" attack
patterns and frequent use of zero-day exploits. We present UNICORN, an anomaly-based …

Fast memory-efficient anomaly detection in streaming heterogeneous graphs

E Manzoor, SM Milajerdi, L Akoglu - Proceedings of the 22nd ACM …, 2016 - dl.acm.org
Given a stream of heterogeneous graphs containing different types of nodes and edges,
how can we spot anomalous ones in real-time while consuming bounded memory? This …

A simple graph embedding for anomaly detection in a stream of heterogeneous labeled graphs

S Lagraa, K Amrouche, H Seba - Pattern Recognition, 2021 - Elsevier
In this work, we propose a new approach to detect anomalous graphs in a stream of directed
and labeled heterogeneous edges. The stream consists of a sequence of edges derived …

New binary linear programming formulation to compute the graph edit distance

J Lerouge, Z Abu-Aisheh, R Raveaux, P Héroux… - Pattern Recognition, 2017 - Elsevier
In this paper, a new binary linear programming formulation for computing the exact Graph
Edit Distance (GED) between two graphs is proposed. A fundamental strength of the …

DeepDetectNet vs RLAttackNet: An adversarial method to improve deep learning-based static malware detection model

Y Fang, Y Zeng, B Li, L Liu, L Zhang - Plos one, 2020 - journals.plos.org
Deep learning methods are being increasingly widely used in static malware detection field
because they can summarize the feature of malware and its variants that have never …

Improved quadratic time approximation of graph edit distance by combining Hausdorff matching and greedy assignment

A Fischer, K Riesen, H Bunke - Pattern Recognition Letters, 2017 - Elsevier
Approximation of graph edit distance in polynomial time enables us to compare large,
arbitrarily labeled graphs for structural pattern recognition. In a recent approximation …

Improving bipartite graph matching by assessing the assignment confidence

M Ferrer, F Serratosa, K Riesen - Pattern Recognition Letters, 2015 - Elsevier
Due to the ability of graphs to represent properties of entities and binary relations at the
same time, a growing interest in this representation formalism can be observed in various …

Discovering recurring activity in temporal networks

O Kostakis, N Tatti, A Gionis - Data Mining and Knowledge Discovery, 2017 - Springer
Recent advances in data-acquisition technologies have equipped team coaches and sports
analysts with the capability of collecting and analyzing detailed data of team activity in the …

Exact graph edit distance computation using a binary linear program

J Lerouge, Z Abu-Aisheh, R Raveaux, P Héroux… - Structural, Syntactic, and …, 2016 - Springer
This paper presents a binary linear program which computes the exact graph edit distance
between two richly attributed graphs (ie with attributes on both vertices and edges). Without …

Semi-supervised malware clustering based on the weight of bytecode and api

Y Fang, W Zhang, B Li, F Jing, L Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
With the rapid advances of anti-virus and anti-tracking technologies, three aspects in
malware clustering need to be improved for effective clustering, ie, the robustness of …