Search Results

1 Results
for "birhanu+eshete"
Use Advanced Search
Sort By:

Real-time Detection and Reconstruction of Advanced Cyber Attack Campaigns from Host Event Logs using Provenance Tags and Customizable Policy

A system and method for identifying cyber attacks and events and reconstruction thereof with improvements in efficiency Background: Cyber security has grown to be a more complex field as technology evolved. Cyber attacks (or CNAs, computer network attacks) are an exploitation of computer systems or networks and often use malicious coding to alter...
Published: 5/2/2023   |   Inventor(s): R. Sekar, Junao Wang, Md Nahid Hossain, Scott Stoller, Sadegh Milajerdi, Birhanu Eshete, Rigel Gjomemo, V.N. Venkatakrishnan
Keywords(s):  
Category(s): Campus > Stony Brook University, Technology Classifications > Computer, Technology Classifications > Information Technology

Search SUNY Technologies

Trending Searches

Latest Technologies