no code implementations • 29 Dec 2017 • Wangyan Feng, Shuning Wu, Xiaodan Li, Kevin Kunkle
The system leverages alert information, various security logs and analysts' investigation results in a real enterprise environment to flag hosts that have high likelihood of being compromised.