no code implementations • 5 Mar 2022 • Maya Kapoor, Joshua Melton, Michael Ridenhour, Mahalavanya Sriram, Thomas Moyer, Siddharth Krishnan
This lack of instrumentation severely inhibits scientific advancement in provenance graph machine learning by hindering reproducibility and limiting the availability of data that are critical for techniques like graph neural networks.
1 code implementation • 18 Aug 2018 • Thomas Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David Eyers, Jean Bacon, Margo Seltzer
Identifying the root cause and impact of a system intrusion remains a foundational challenge in computer security.
Cryptography and Security Operating Systems