Picture for Xusheng Xiao

Xusheng Xiao

On the Security Risks of Knowledge Graph Reasoning

Add code
May 03, 2023
Figure 1 for On the Security Risks of Knowledge Graph Reasoning
Figure 2 for On the Security Risks of Knowledge Graph Reasoning
Figure 3 for On the Security Risks of Knowledge Graph Reasoning
Figure 4 for On the Security Risks of Knowledge Graph Reasoning
Viaarxiv icon

A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence

Add code
Jan 17, 2021
Figure 1 for A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence
Figure 2 for A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence
Figure 3 for A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence
Viaarxiv icon

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence

Add code
Oct 26, 2020
Figure 1 for Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
Figure 2 for Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
Figure 3 for Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
Figure 4 for Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
Viaarxiv icon

Behavior Query Discovery in System-Generated Temporal Graphs

Add code
Nov 19, 2015
Figure 1 for Behavior Query Discovery in System-Generated Temporal Graphs
Figure 2 for Behavior Query Discovery in System-Generated Temporal Graphs
Figure 3 for Behavior Query Discovery in System-Generated Temporal Graphs
Figure 4 for Behavior Query Discovery in System-Generated Temporal Graphs
Viaarxiv icon