no code implementations • 23 Apr 2021 • Prakruthi Karuna, Erik Hemberg, Una-May O'Reilly, Nick Rutar
Scaling the cyber hunt problem poses several key technical challenges.
1 code implementation • 1 Oct 2020 • Erik Hemberg, Jonathan Kelly, Michal Shlapentokh-Rothman, Bryn Reinstadler, Katherine Xu, Nick Rutar, Una-May O'Reilly
Many public sources of cyber threat and vulnerability information exist to serve the defense of cyber systems.
Cryptography and Security