2014
DOI: 10.1109/msp.2014.84
|View full text |Cite
|
Sign up to set email alerts
|

An Anthropological Approach to Studying CSIRTs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
36
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(36 citation statements)
references
References 5 publications
0
36
0
Order By: Relevance
“…LAD supports offline detection or forensics of program attacks, in which case accuracy is the main concern instead of performance [56]. Our Pintool enables analysts to locate anomalies within long program traces, and our matrices provide caller information for individual function calls.…”
Section: Performance Analysismentioning
confidence: 99%
“…LAD supports offline detection or forensics of program attacks, in which case accuracy is the main concern instead of performance [56]. Our Pintool enables analysts to locate anomalies within long program traces, and our matrices provide caller information for individual function calls.…”
Section: Performance Analysismentioning
confidence: 99%
“…Another challenge is that incident response tasks are complex, and no manual or textbook offers clear guidance explaining how the job should be performed [18]. The job of incident responder is further conflated by claims that responders may specialize in related areas such as forensics, data mining, reverse engineering, configuration of countermeasures, or penetration testing [5].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Our approach can support offline detection or forensics of program attacks, in which case accuracy is the main concern instead of performance [42]. Our Pintool enables analysts to locate anomalies within execution windows, and our matrices provide caller information for individual function calls.…”
Section: Performance Analysismentioning
confidence: 99%
“…To deal with the borderline behavior issue, we alter the standard process into a two-step process: i) generate scopes of clusters in an agglomerative way (line 13-28), and ii) add behavior instances to generated clusters (line [30][31][32][33][34][35][36][37][38][39][40][41][42][43][44].…”
mentioning
confidence: 99%
See 1 more Smart Citation