450
Total Concepts
255
Published
195
Unpublished

Tactics (7)

Evict
Evict
Restore
Restore
Detect
Detect
Deceive
Deceive
Model
Model
Harden
Harden
Isolate
Isolate

Techniques (443)

D3-AA
Agent Authentication
D3-ABPI
Application-based Process Isolation
D3-ACA
Active Certificate Analysis
D3-ACH
Application Configuration Hardening
D3-AH
Application Hardening
D3-AI
Asset Inventory
D3-AL
Account Locking
D3-ALLM
Active Logical Link Mapping
D3-AM
Access Modeling
D3-AMED
Access Mediation
D3-ANAA
Administrative Network Activity Analysis
D3-ANCI
Authentication Cache Invalidation
D3-ANET
Authentication Event Thresholding
D3-APA
Access Policy Administration
D3-APLM
Active Physical Link Mapping
D3-ARMA
ARMA Model
Unpublished
D3-AVE
Asset Vulnerability Enumeration
D3-AZET
Authorization Event Thresholding
D3-BA
Bootloader Authentication
D3-BAN
Biometric Authentication
D3-BDI
Broadcast Domain Isolation
D3-BSE
Byte Sequence Emulation
D3-CA
Certificate Analysis
D3-CAA
Connection Attempt Analysis
D3-CBAN
Certificate-based Authentication
D3-CCSA
Credential Compromise Scope Analysis
D3-CE
Credential Eviction
D3-CERO
Certificate Rotation
D3-CF
Content Filtering
D3-CFC
Content Format Conversion
D3-CFP
Change Default Password
D3-CH
Credential Hardening
D3-CHN
Connected Honeynet
D3-CI
Configuration Inventory
D3-CIA
Container Image Analysis
D3-CM
Content Modification
D3-CNE
Content Excision
D3-CNR
Content Rebuild
D3-CNS
Content Substitution
D3-CP
Certificate Pinning
D3-CQ
Content Quarantine
D3-CR
Credential Revocation
D3-CRO
Credential Rotation
D3-CS
Credential Scrubbing
D3-CSPP
Client-server Payload Profiling
D3-CTS
Credential Transmission Scoping
D3-CV
Content Validation
D3-DA
Dynamic Analysis
D3-DAM
Domain Account Monitoring
D3-DCE
Dead Code Elimination
D3-DE
Decoy Environment
D3-DEM
Data Exchange Mapping
D3-DENCR
Disk Encryption
D3-DF
Decoy File
D3-DI
Data Inventory
D3-DKE
Disk Erasure
D3-DKF
Disk Formatting
D3-DKP
Disk Partitioning
D3-DLIC
Driver Load Integrity Checking
D3-DNR
Decoy Network Resource
D3-DNRA
Domain Name Reputation Analysis
D3-DNSAL
DNS Allowlisting
D3-DNSCE
DNS Cache Eviction
D3-DNSDL
DNS Denylisting
D3-DNSTA
DNS Traffic Analysis
D3-DO
Decoy Object
D3-DP
Decoy Persona
D3-DPLM
Direct Physical Link Mapping
D3-DPR
Decoy Public Release
D3-DQSA
Database Query String Analysis
D3-DRT
Domain Registration Takedown
D3-DST
Decoy Session Token
D3-DTP
Domain Trust Policy
D3-DUC
Decoy User Credential
D3-EAL
Executable Allowlisting
D3-EBWSAM
Endpoint-based Web Server Access Mediation
D3-EDL
Executable Denylisting
D3-EF
Email Filtering
D3-EFA
Emulated File Analysis
D3-EHB
Endpoint Health Beacon
D3-EHPV
Exception Handler Pointer Validation
D3-EI
Execution Isolation
D3-ER
Email Removal
D3-ET
Encrypted Tunnels
D3-FA
File Analysis
D3-FAPA
File Access Pattern Analysis
D3-FBA
Firmware Behavior Analysis
D3-FC
File Carving
D3-FCA
File Creation Analysis
D3-FCDC
File Content Decompression Checking
D3-FCOA
File Content Analysis
D3-FCR
File Content Rules
D3-FE
File Encryption
D3-FEMC
Firmware Embedded Monitoring Code
D3-FEV
File Eviction
D3-FFV
File Format Verification
D3-FH
File Hashing
D3-FHRA
File Hash Reputation Analysis
D3-FIM
File Integrity Monitoring
D3-FISV
File Internal Structure Verification
D3-FMBV
File Magic Byte Verification
D3-FMCV
File Metadata Consistency Validation
D3-FMVV
File Metadata Value Verification
D3-FRDDL
Forward Resolution Domain Denylisting
D3-FRIDL
Forward Resolution IP Denylisting
D3-FV
Firmware Verification
D3-HBPI
Hardware-based Process Isolation
D3-HBWP
Hardware-based Write Protection
D3-HCI
Hardware Component Inventory
D3-HD
Homoglyph Detection
D3-HDDL
Hierarchical Domain Denylisting
D3-HDL
Homoglyph Denylisting
D3-HR
Host Reboot
D3-HS
Host Shutdown
D3-IAA
Identifier Activity Analysis
D3-IBCA
Indirect Branch Call Analysis
D3-ID
Identifier Analysis
D3-IDA
Input Device Analysis
D3-IHN
Integrated Honeynet
D3-IOPR
IO Port Restriction
D3-IPCTA
IPC Traffic Analysis
D3-IPRA
IP Reputation Analysis
D3-IRA
Identifier Reputation Analysis
D3-IRV
Integer Range Validation
D3-ISVA
Inbound Session Volume Analysis
D3-ITF
Inbound Traffic Filtering
D3-JFAPA
Job Function Access Pattern Analysis
D3-KBPI
Kernel-based Process Isolation
D3-LAM
Local Account Monitoring
D3-LAMED
LAN Access Mediation
D3-LFAM
Local File Access Mediation
D3-LFP
Local File Permissions
D3-LLM
Logical Link Mapping
D3-MA
Message Analysis
D3-MAN
Message Authentication
D3-MBSV
Memory Block Start Validation
D3-MBT
Memory Boundary Tracking
D3-MENCR
Message Encryption
D3-MFA
Multi-factor Authentication
D3-MH
Message Hardening
D3-NAM
Network Access Mediation
D3-NI
Network Isolation
D3-NM
Network Mapping
D3-NNI
Network Node Inventory
D3-NPC
Null Pointer Checking
D3-NRAM
Network Resource Access Mediation
D3-NTA
Network Traffic Analysis
D3-NTCD
Network Traffic Community Deviation
D3-NTF
Network Traffic Filtering
D3-NTPM
Network Traffic Policy Mapping
D3-NTSA
Network Traffic Signature Analysis
D3-NVA
Network Vulnerability Assessment
D3-OAM
Operational Activity Mapping
D3-ODM
Operational Dependency Mapping
D3-OE
Object Eviction
D3-OM
Organization Mapping
D3-OMM
Operating Mode Monitoring
D3-OPR
Operating Mode Restriction
D3-ORA
Operational Risk Assessment
D3-OSM
Operating System Monitoring
D3-OTF
Outbound Traffic Filtering
D3-OTP
One-time Password
D3-PA
Process Analysis
D3-PAM
Physical Access Mediation
D3-PAN
Pointer Authentication
D3-PBWSAM
Proxy-based Web Server Access Mediation
D3-PCA
Passive Certificate Analysis
D3-PCSV
Process Code Segment Verification
D3-PE
Process Eviction
D3-PFV
Peripheral Firmware Verification
D3-PH
Platform Hardening
D3-PHDURA
Per Host Download-Upload Ratio Analysis
D3-PLA
Process Lineage Analysis
D3-PLLM
Passive Logical Link Mapping
D3-PLM
Physical Link Mapping
D3-PM
Platform Monitoring
D3-PMAD
Protocol Metadata Anomaly Detection
D3-PR
Password Rotation
D3-PS
Process Suspension
D3-PSA
Process Spawn Analysis
D3-PSEP
Process Segment Execution Prevention
D3-PSMD
Process Self-Modification Detection
D3-PT
Process Termination
D3-PV
Pointer Validation
D3-PWA
Password Authentication
D3-RA
Restore Access
D3-RAM
Routing Access Mediation
D3-RAPA
Resource Access Pattern Analysis
D3-RC
Restore Configuration
D3-RD
Restore Database
D3-RDI
Restore Disk Image
D3-RE
Restore Email
D3-RF
Restore File
D3-RFAM
Remote File Access Mediation
D3-RFS
RF Shielding
D3-RIC
Reissue Credential
D3-RKD
Registry Key Deletion
D3-RN
Reference Nullification
D3-RNA
Restore Network Access
D3-RO
Restore Object
D3-RPA
Relay Pattern Analysis
D3-RRID
Reverse Resolution IP Denylisting
D3-RS
Restore Software
D3-RTA
RPC Traffic Analysis
D3-RTSD
Remote Terminal Session Detection
D3-RUAA
Restore User Account Access
D3-SAOR
Segment Address Offset Randomization
D3-SBV
Service Binary Verification
D3-SCA
System Call Analysis
D3-SCF
System Call Filtering
D3-SCH
Source Code Hardening
D3-SCP
System Configuration Permissions
D3-SDA
Session Duration Analysis
D3-SDM
System Daemon Monitoring
D3-SEA
Script Execution Analysis
D3-SFA
System File Analysis
D3-SFCV
Stack Frame Canary Validation
D3-SFV
System Firmware Verification
D3-SHN
Standalone Honeynet
D3-SICA
System Init Config Analysis
D3-SJA
Scheduled Job Analysis
D3-SMRA
Sender MTA Reputation Analysis
D3-SPP
Strong Password Policy
D3-SRA
Sender Reputation Analysis
D3-SSC
Shadow Stack Comparisons
D3-ST
Session Termination
D3-SU
Software Update
D3-SVCDM
Service Dependency Mapping
D3-SWI
Software Inventory
D3-SYSDM
System Dependency Mapping
D3-SYSM
System Mapping
D3-SYSVA
System Vulnerability Assessment
D3-TAAN
Transfer Agent Authentication
D3-TB
Token Binding
D3-TBA
Token-based Authentication
D3-TBI
TPM Boot Integrity
D3-TL
Trusted Library
D3-UA
URL Analysis
D3-UAP
User Account Permissions
D3-UBA
User Behavior Analysis
D3-UDTA
User Data Transfer Analysis
D3-UGLPA
User Geolocation Logon Pattern Analysis
D3-ULA
Unlock Account
D3-URA
URL Reputation Analysis
D3-USICA
User Session Init Config Analysis
D3-VI
Variable Initialization
D3-VTV
Variable Type Validation
D3-WSAA
Web Session Activity Analysis
D3-WSAM
Web Session Access Mediation
D3A-AAD
Average Absolute Deviation
Unpublished
D3A-ABC
ANN-based Clustering
Unpublished
D3A-AC
Actor-Critic
Unpublished
D3A-AFTL
Asymmetric Feature-based Transfer Learning
Unpublished
D3A-AL
Alethic Logic
Unpublished
D3A-AM
ARIMA Model
Unpublished
D3A-ANNC
Artificial Neural Network Classification
Unpublished
D3A-ARL
Association Rule Learning
Unpublished
D3A-ARTC
Adaptive Resonance Theory Clustering
Unpublished
D3A-ASM
Approximate String Matching
Unpublished
D3A-ASP
Answer Set Programming
Unpublished
D3A-AUT
Autoencoding
Unpublished
D3A-BA
Bootstrap Aggregating
Unpublished
D3A-BE
Bayesian Estimation
Unpublished
D3A-BEM
Boolean Expression Matching
Unpublished
D3A-BER
BERT
Unpublished
D3A-BHT
Bayesian Hypothesis Testing
Unpublished
D3A-BLR
Bayesian Linear Regression
Unpublished
D3A-BLRL
Bayesian Linear Regression Learning
Unpublished
D3A-BM
Bayesian Method
Unpublished
D3A-BMA
Bayesian Model Averaging
Unpublished
D3A-BMC
Bayesian Model Combination
Unpublished
D3A-BOC
Bayes Optimal Classifier
Unpublished
D3A-BOM
Bucket of Models
Unpublished
D3A-BOO
Boosting
Unpublished
D3A-C4.
C4.5
Unpublished
D3A-C5.
C5.0
Unpublished
D3A-CA
Cluster Analysis
Unpublished
D3A-CAR
CART
Unpublished
D3A-CBC
Centroid-based Clustering
Unpublished
D3A-CC
Canopy Clustering
Unpublished
D3A-CLA
Classification
Unpublished
D3A-CNN
Convolutional Neural Network
Unpublished
D3A-COR
Correlation
Unpublished
D3A-COV
Coefficient of Variation
Unpublished
D3A-CT
Central Tendency
Unpublished
D3A-CV
Cramer's V
Unpublished
D3A-CYC
CycleGAN
Unpublished
D3A-DA
Discriminant Analysis
Unpublished
D3A-DAT
Datalog
Unpublished
D3A-DBC
DNN-based Clustering
Unpublished
D3A-DBS
DBSCAN
Unpublished
D3A-DC
Divisive Clustering
Unpublished
D3A-DCG
Deep Convolutional GAN
Unpublished
D3A-DL
Deontic Logic
Unpublished
D3A-DNNC
Deep Neural Network Classification
Unpublished
D3A-DP
Distribution Properties
Unpublished
D3A-DQ
Dyna-Q
Unpublished
D3A-DQL
Deep Q-learning
Unpublished
D3A-DR
Dimension Reduction
Unpublished
D3A-DS
Descriptive Statistics
Unpublished
D3A-DT
Decision Tree
Unpublished
D3A-DTR
Decision Tree Regression
Unpublished
D3A-DWM
Density-weighted Method
Unpublished
D3A-EER
Expected Error Reduction
Unpublished
D3A-EL
Ensemble Learning
Unpublished
D3A-EM
Equivalence Matching
Unpublished
D3A-EMC
Expected Model Change
Unpublished
D3A-EST
Estimation
Unpublished
D3A-FL
Fuzzy Logic
Unpublished
D3A-FOL
First-order Logic
Unpublished
D3A-GAKG
Goodman and Kruskal's Gamma
Unpublished
D3A-GAN
Generative Adversarial Network
Unpublished
D3A-GBC
Graph-based Clustering
Unpublished
D3A-GBDT
Gradient-Boosted Decision Tree
Unpublished
D3A-GBSSL
Graph-based Semi-supervised Learning
Unpublished
D3A-GC
Grid-CNN
Unpublished
D3A-GM
Geometric Mean
Unpublished
D3A-GPT
GPT
Unpublished
D3A-GRU
Gated Recurrent Unit
Unpublished
D3A-HAFBTL
Heterogeneous Asymmetric Feature-based Transfer Learning
Unpublished
D3A-HBTL
Hybrid-based Transfer Learning
Unpublished
D3A-HC
Hierarchical Clustering
Unpublished
D3A-HDC
High-dimension Clustering
Unpublished
D3A-HFBTL
Heterogeneous Feature-based Transfer Learning
Unpublished
D3A-HM
Harmonic Mean
Unpublished
D3A-HOL
Higher-order Logic
Unpublished
D3A-HT
Hypothesis Testing
Unpublished
D3A-HTL
Heterogeneous Transfer Learning
Unpublished
D3A-IBTL
Instance-based Transfer Learning
Unpublished
D3A-ID3
ID3
Unpublished
D3A-IE
Interval Estimation
Unpublished
D3A-IR
Interquartile Range
Unpublished
D3A-IS
Inferential Statistics
Unpublished
D3A-ISG
Image Synthesis GAN
Unpublished
D3A-ISSL
Intrinsically Semi-supervised Learning
Unpublished
D3A-ITITG
Image-to-Image Translation GAN
Unpublished
D3A-KCC
K-Center Clustering
Unpublished
D3A-KFCV
K-Fold Cross-Validation
Unpublished
D3A-KMC
K-means Clustering
Unpublished
D3A-KNN
K-Nearest Neighbors
Unpublished
D3A-KRCC
Kendall's Rank Correlation Coefficient
Unpublished
D3A-KUR
Kurtosis
Unpublished
D3A-LC
Linear Classifier
Unpublished
D3A-LLP
Linear Logic Programming
Unpublished
D3A-LM
Levenschtein Matching
Unpublished
D3A-LP
Logic Programming
Unpublished
D3A-LR
Linear Regression
Unpublished
D3A-LRL
Linear Regression Learning
Unpublished
D3A-LSTM
Long Short-term Memory
Unpublished
D3A-MA
Multivariate Analysis
Unpublished
D3A-MAD
Median Absolute Deviation
Unpublished
D3A-MAM
Moving Average Model
Unpublished
D3A-MBPO
Model-based Policy Optimization
Unpublished
D3A-MBRL
Model-based Reinforcement Learning
Unpublished
D3A-MBVI
Model-based Value Iteration
Unpublished
D3A-MEA
Mean
Unpublished
D3A-MED
Median
Unpublished
D3A-MFRL
Model-free Reinforcement Learning
Unpublished
D3A-ML
Modal Logic
Unpublished
D3A-MML
Maximum-margin Learning
Unpublished
D3A-MOD
Mode
Unpublished
D3A-MOM
Moments
Unpublished
D3A-MPC
Multilayer Perceptron Classification
Unpublished
D3A-MR
Multiple Regression
Unpublished
D3A-MRL
Multiple Regression Learning
Unpublished
D3A-NBC
Naive Bayes Classifier
Unpublished
D3A-NML
Non-monotonic Logic
Unpublished
D3A-NPM
Numeric Pattern Matching
Unpublished
D3A-NPT
Non-Parametric Tests
Unpublished
D3A-NR
Nonlinear Regression
Unpublished
D3A-NRL
Nonlinear Regression Learning
Unpublished
D3A-OWL
OWL
Unpublished
D3A-PBC
Projection-based Clustering
Unpublished
D3A-PBCC
Point-biserial Correlation Coefficient
Unpublished
D3A-PBL
Perturbation-based Learning
Unpublished
D3A-PBTL
Parameter-based Transfer Learning
Unpublished
D3A-PC
Projected Clustering
Unpublished
D3A-PCA
Principal Component Analysis
Unpublished
D3A-PCC
Pearson's Correlation Coefficient
Unpublished
D3A-PE
Point Estimation
Unpublished
D3A-PG
Policy Gradient
Unpublished
D3A-PGG
Progressively Growing GAN
Unpublished
D3A-PIX
Pix2Pix
Unpublished
D3A-PL
Propositional Logic
Unpublished
D3A-PM
Pattern Matching
Unpublished
D3A-PRO
Prolog
Unpublished
D3A-PT
Parametric Tests
Unpublished
D3A-QBC
Query By Committee
Unpublished
D3A-QL
Q-Learning
Unpublished
D3A-RA
Regression Analysis
Unpublished
D3A-RAL
Regression Analysis Learning
Unpublished
D3A-RAN
Range
Unpublished
D3A-RBTL
Relational-based Transfer Learning
Unpublished
D3A-RC
Rank Correlation
Unpublished
D3A-RE
Resampling Ensemble
Unpublished
D3A-RF
Random Forest
Unpublished
D3A-RL
Reinforcement Learning
Unpublished
D3A-RM
Regex Matching
Unpublished
D3A-RNN
Recurrent Neural Network
Unpublished
D3A-RS
Random Splits
Unpublished
D3A-SAR
SARSA
Unpublished
D3A-SC
Spectral Clustering
Unpublished
D3A-SD
Somers' D
Unpublished
D3A-SEM
String Equivalence Matching
Unpublished
D3A-SEQ
SeqGAN
Unpublished
D3A-SFTL
Symmetric Feature-based Transfer Learning
Unpublished
D3A-SKE
Skewness
Unpublished
D3A-SL
Symbolic Logic
Unpublished
D3A-SM
Soundex Matching
Unpublished
D3A-SOM
Self-organizing Map
Unpublished
D3A-SPM
String Pattern Matching
Unpublished
D3A-SR
Symbolic AI
Unpublished
D3A-SRCC
Spearman's Rank Correlation Coefficient
Unpublished
D3A-SSB
Semi-supervised Boosting
Unpublished
D3A-SSCT
Semi-supervised Co-training
Unpublished
D3A-SSCTL
Semi-supervised Cluster-then-label
Unpublished
D3A-SSFE
Semi-supervised Feature Extraction
Unpublished
D3A-SSGML
Semi-supervised Generative Model Learning
Unpublished
D3A-SSIL
Semi-supervised Inductive Learning
Unpublished
D3A-SSL
Semi-Supervised Learning
Unpublished
D3A-SSML
Semi-supervised Manifold Learning
Unpublished
D3A-SSPT
Semi-supervised Pre-training
Unpublished
D3A-SSST
Semi-supervised Self-training
Unpublished
D3A-SSTL
Semi-supervised Transductive Learning
Unpublished
D3A-SSWM
Semi-supervised Wrapper Method
Unpublished
D3A-STA
Stacking
Unpublished
D3A-STY
StyleGAN
Unpublished
D3A-SVD
Singular Value Decomposition
Unpublished
D3A-SVMC
Support Vector Machine Classification
Unpublished
D3A-TBL
Transformer-based Learning
Unpublished
D3A-TDL
Temporal Difference Learning
Unpublished
D3A-TL
Temporal Logic
Unpublished
D3A-TM
Trimmed Mean
Unpublished
D3A-TSA
Time Series Analysis
Unpublished
D3A-TSC
t-SNE Clustering
Unpublished
D3A-TX
Transformer-XL
Unpublished
D3A-UL
Unsupervised Learning
Unpublished
D3A-UP
Unsupervised Preprocessing
Unpublished
D3A-US
Uncertainty Sampling
Unpublished
D3A-VAR
Variability
Unpublished
D3A-VOT
Voting
Unpublished
D3A-VR
Variance Reduction
Unpublished
D3A-WM
Weighted Mean
Unpublished