| | D3-ACH Application Configuration Hardening D3-AH Application Hardening | | D3-ABPI Application-based Process Isolation | | | D3-RS Restore Software |
| | D3-CH Credential Hardening | D3-CCSA Credential Compromise Scope Analysis | | D3-DUC Decoy User Credential | D3-CE Credential Eviction | |
| D3A-ANNC Artificial Neural Network Classification D3A-CNN Convolutional Neural Network D3A-DNNC Deep Neural Network Classification D3A-GAN Generative Adversarial Network D3A-RNN Recurrent Neural Network | | D3-ANAA Administrative Network Activity Analysis D3-DNSTA DNS Traffic Analysis D3-IPCTA IPC Traffic Analysis D3-NTA Network Traffic Analysis D3-NTSA Network Traffic Signature Analysis D3-RTA RPC Traffic Analysis | D3-NI Network Isolation | D3-DNR Decoy Network Resource | D3-DNSCE DNS Cache Eviction | D3-RNA Restore Network Access |
| | | D3-EFA Emulated File Analysis D3-FAPA File Access Pattern Analysis D3-FA File Analysis D3-FCOA File Content Analysis D3-FCA File Creation Analysis D3-FHRA File Hash Reputation Analysis D3-FIM File Integrity Monitoring D3-SFA System File Analysis | | D3-DF Decoy File | D3-FEV File Eviction | D3-RF Restore File |
| D3A-LSTM Long Short-term Memory D3A-UP Unsupervised Preprocessing | | D3-PA Process Analysis D3-PLA Process Lineage Analysis D3-PSMD Process Self-Modification Detection D3-PSA Process Spawn Analysis | D3-HBPI Hardware-based Process Isolation D3-KBPI Kernel-based Process Isolation D3-PCSV Process Code Segment Verification D3-PSEP Process Segment Execution Prevention | | D3-PE Process Eviction D3-PT Process Termination | |
| D3-AM Access Modeling D3-ARMA ARMA Model D3-AI Asset Inventory D3A-BA Bootstrap Aggregating D3-BDI Broadcast Domain Isolation D3-DRT Domain Registration Takedown D3-DTP Domain Trust Policy D3-EF Email Filtering D3-ER Email Removal D3-FRDDL Forward Resolution Domain Denylisting
+2 more
| D3-IOPR IO Port Restriction D3-MH Message Hardening D3-OPR Operating Mode Restriction D3-PH Platform Hardening | D3-OSM Operating System Monitoring D3-SCA System Call Analysis D3-SDM System Daemon Monitoring D3-SICA System Init Config Analysis | D3-BDI Broadcast Domain Isolation D3-SAOR Segment Address Offset Randomization | D3-CHN Connected Honeynet D3-DE Decoy Environment D3-DO Decoy Object D3-DP Decoy Persona D3-DPR Decoy Public Release D3-DST Decoy Session Token D3-IHN Integrated Honeynet D3-SHN Standalone Honeynet | D3-OE Object Eviction D3-RKD Registry Key Deletion D3-ST Session Termination | D3-RE Restore Email D3-CNR Content Rebuild D3-RA Restore Access D3-RC Restore Configuration D3-RDI Restore Disk Image D3-RO Restore Object |
| D3-DAM Domain Account Monitoring | | D3-DAM Domain Account Monitoring D3-LAM Local Account Monitoring D3-UBA User Behavior Analysis D3-UDTA User Data Transfer Analysis D3-UGLPA User Geolocation Logon Pattern Analysis D3-USICA User Session Init Config Analysis | | | | D3-RUAA Restore User Account Access |
| D3A-AC Actor-Critic D3A-ARTC Adaptive Resonance Theory Clustering D3A-AL Alethic Logic D3A-ABC ANN-based Clustering D3A-ASP Answer Set Programming D3A-ASM Approximate String Matching D3A-AM ARIMA Model D3A-ARL Association Rule Learning D3A-AFTL Asymmetric Feature-based Transfer Learning D3A-AUT Autoencoding
+178 more
| | D3A-CA Cluster Analysis D3-CIA Container Image Analysis D3A-DBS DBSCAN D3A-DA Discriminant Analysis D3-DNRA Domain Name Reputation Analysis D3A-MA Multivariate Analysis D3A-PCA Principal Component Analysis D3A-RA Regression Analysis D3A-RAL Regression Analysis Learning D3A-TSA Time Series Analysis
+33 more
| D3-CIA Container Image Analysis | | | |
| | D3-SCH Source Code Hardening | | D3-EI Execution Isolation | | | |
| | | | | | | D3-RD Restore Database |