共 53 条
[1]
Amati G., 2009, Encyclopedia of database systems, P257, DOI [DOI 10.1007/978-0-387-39940-9_921, 10.1007/978-0-387-39940-9921, DOI 10.1007/978-0-387-39940-9921]
[2]
[Anonymous], 2022, CyberMonitor
[3]
[Anonymous], 2022, Threat Report ATT & CK Mapping
[4]
[Anonymous], 2022, Yara
[5]
[Anonymous], ADVERSARIAL TACTICS
[6]
Automated Threat Report Classification Over Multi-Source Data
[J].
2018 4TH IEEE INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2018),
2018,
:236-245
[7]
Barnum S., 2012, Standardizing Cyber Threat Intelligence Information With the Structured Threat Information Expression (STIX), VII, P1
[8]
Bastos A, 2021, Arxiv, DOI arXiv:2009.08694
[9]
Belfadel Abdelhadi, 2023, Web Information Systems Engineering - WISE 2023: 24th International Conference, Proceedings. Lecture Notes in Computer Science (14306), P865, DOI 10.1007/978-981-99-7254-8_67
[10]
Bhutani B., 2019, P 12 INT C CONT COMP, P1