Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,559 papers from all fields of science
Search
Sign In
Create Free Account
Indicator of compromise
Known as:
IOC (disambiguation)
, Indicator
Indicator of compromise (IOC) — in computer forensics is an artifact observed on a network or in an operating system that with high confidence…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Antivirus software
Botnet
Intrusion detection system
Malware
Expand
Broader (1)
Computer forensics
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Indicators of Compromise (IoCs) and Their Role in Attack Defence
P. Kirsty
,
O. Whitehouse
2020
Corpus ID: 260874973
Indicators of Compromise (IoCs) are an important technique in attack defence (often called cyber defence). This document outlines…
Expand
2019
2019
Malicious URL Linkage Analysis and Common Pattern Discovery
Shin-Ying Huang
,
Tzu-Hsien Chuang
,
Shih-Meng Huang
,
Tao Ban
IEEE International Conference on Big Data (Big…
2019
Corpus ID: 211298360
Malicious domain names are consistently changing. It is challenging to keep blacklists of malicious domain names up-to-date…
Expand
2019
2019
iMCircle: Automatic Mining of Indicators of Compromise from the Web
Panpan Zhang
,
Jing Ya
,
Tingwen Liu
,
Quangang Li
,
Jinqiao Shi
,
Zhaojun Gu
International Symposium on Computers and…
2019
Corpus ID: 210972579
With the rapidly evolving landscape of cyber threats, Indicators of Compromise (IOCs) are aggressively exchanged as forensic…
Expand
2018
2018
A Systems Approach to Indicators of Compromise Utilizing Graph Theory
IEEE International Conference on Technologies for…
2018
Corpus ID: 56172776
It is common to record indicators of compromise (IoC) in order to describe a particular breach and to attempt to attribute a…
Expand
2018
2018
Privacy-friendly threat detection using DNS
Rijnders
2018
Corpus ID: 54080265
It is increasingly important for network operators to be able to detect the threats that their users are facing. The DNS (Domain…
Expand
2018
2018
Community Discovery of Attribution Trace Based on Deep Learning Approach
Jian Xu
,
Xiao-chun Yun
,
Yongzheng Zhang
,
Zhenyu Cheng
International Conference on Information…
2018
Corpus ID: 53091242
In order to prevent potential network crime and halt attackers’ operation further, collecting information to profile attackers is…
Expand
2017
2017
iGen: Toward Automatic Generation and Analysis of Indicators of Compromise (IOCs) using Convolutional Neural Network
Anupam Panwar
2017
Corpus ID: 55134203
Field of cyber threats is evolving rapidly and every day multitude of new information about malware and Advanced Persistent…
Expand
2017
2017
Tracking Cyber Adversaries with Adaptive Indicators of Compromise
J. Doak
,
J. Ingram
,
+6 authors
D. Follett
International Conference on Computational Science…
2017
Corpus ID: 38279099
A forensics investigation after a breach often uncovers network and host indicators of compromise (IOCs) that can be deployed to…
Expand
Review
2017
Review
2017
Processing of Notifications Produced by Intrusion Detection Systems in CERN’s Security Operations Centre
Amund Faller Råheim
2017
Corpus ID: 115991065
This thesis focuses on the implementation of an application processing notifications produced by intrusion detection systems…
Expand
2016
2016
Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs
María del Carmen Prudente Tixteco
,
Lidia Prudente Tixteco
,
Gabriel Pérez
,
L. Medina
2016
Corpus ID: 56439173
Nowadays computer attacks and intrusions have become more common affecting confidentiality, integrity or the availability of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE