共 50 条
- [31] DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I, 2021, 398 : 3 - 24
- [33] Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence 2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2018, : 1 - 6
- [34] Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence 2017 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2017, : 91 - 98
- [35] A survey on cyber threat intelligence sharing based on Blockchain Advances in Computational Intelligence, 2023, 3 (3):
- [37] A Smart Contract Approach to Cyber Threat Intelligence Sharing in Kenya 2022 IST-AFRICA CONFERENCE, 2022,
- [38] An Effective Approach of Named Entity Recognition for Cyber Threat Intelligence PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 1370 - 1374
- [40] Cyber Threat Intelligence and Machine Learning Proceedings - 2022 4th International Conference on Transdisciplinary AI, TransAI 2022, 2022, : 156 - 159