共 50 条
- [42] Cyber threat challenges intelligence capability AVIATION WEEK & SPACE TECHNOLOGY, 1997, 146 (06): : 20 - 21
- [43] Cyber threat challenges intelligence capability Aviation Week and Space Technology (New York), 1997, 146 (06):
- [44] NO-DOUBT: Attack Attribution Based On Threat Intelligence Reports 2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2019, : 80 - 85
- [45] Generating Fake Cyber Threat Intelligence Using Transformer-Based Models 2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
- [46] AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 589 - 609
- [49] Approach of goal-oriented attack graph-based threat evaluation for network security Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (01): : 82 - 86
- [50] Using Smart Glasses for Monitoring Cyber Threat Intelligence Feeds PROCEEDINGS OF THE 2021 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING, ASONAM 2021, 2021, : 630 - 634