Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Furthermore, the real-world environment was not sufficiently considered in the log reduction algorithm, wherein all threat alerts were assumed to be reduced by the default EDR tool. Kieseberg et al [15] compared the features and functions of Google's GRR, Facebook's osquery, and Mozilla's InvestiGator, representative remote live forensic solutions of Google, Facebook, and Mozilla, respectively, and analyzed whether these programs accurately detected malicious programs. These companies routinely check thousands of computers.…”
Section: Detection Of Cyberattacks By Using Threat Detectorsmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, the real-world environment was not sufficiently considered in the log reduction algorithm, wherein all threat alerts were assumed to be reduced by the default EDR tool. Kieseberg et al [15] compared the features and functions of Google's GRR, Facebook's osquery, and Mozilla's InvestiGator, representative remote live forensic solutions of Google, Facebook, and Mozilla, respectively, and analyzed whether these programs accurately detected malicious programs. These companies routinely check thousands of computers.…”
Section: Detection Of Cyberattacks By Using Threat Detectorsmentioning
confidence: 99%
“…In this section, the capability and performance of various commercial open-source threat detection systems were analyzed. The main open-source threat detectors considered were open-source host intrusion detection system (HIDS) security (OSSEC), TheHive, and Whids [21], which were analyzed by using Kieseberg et al's comparison metrics [15].…”
Section: Open-source Threat Detector Analysismentioning
confidence: 99%
“…During this period, attackers had enough time to complete their attacks and cover their tracks. Furthermore, [13] described the system structure and functionality of GRR, osquery, and Mozilla InvestiGator, comparing their performances by establishing representative features that were successfully handled. Although both studies suggest the limitations of EDR, there is a limitation in that they do not specifically address the solution.…”
Section: Related Workmentioning
confidence: 99%
“…Further to proposing a cognitive approach to watchlist screening, this paper addresses H-M and M-M interactions in the form of an e-interviewer. The biometricenabled watchlist as a part of cognitive checkpoint is closely related to forensics [40], [44], [50] and cyberphysical forensics [43].…”
Section: Generic Trends As a Summarymentioning
confidence: 99%