共 29 条
- [1] YIN Y, ZHANG H B, LIU B, Et al., Threat intelligence technology in network security situation awareness, Journal of Hebei University of Science and Technology, 42, 2, pp. 195-204, (2021)
- [2] WANG H, YANG T C., Network threat intelligence correlation analysis technology, Information Technology, 45, 2, pp. 26-32, (2021)
- [3] LYU Q S, DING M, LIU Q, Et al., Are we really making much progress? Revisiting, benchmarking and refining heterogeneous graph neural networks, Proceedings of the ACM SIGKDD Conference on Knowledge Discovery & Data Mining, pp. 1150-1160, (2021)
- [4] ZHAO N, LI L, LIU Q C, Et al., Analysis and management of threat intelligence based on OSINT, Journal of Intelligence, 40, 11, pp. 16-22, (2021)
- [5] DANG C H, MA Z W, SHAO G F, Et al., Research on defense system based on big data and threat intelligence, Computer & Network, 47, 15, pp. 46-47, (2021)
- [6] HE Z P, LIU P, WANG H., Analysis on standardization construction of cyber threat intelligence, Journal of Information Security Research, 7, 6, pp. 503-511, (2021)
- [7] ZHANG H B, YIN Y, ZHAO D M, Et al., Network security situational awareness model based on threat intelligence, Journal on Communications, 42, 6, pp. 182-194, (2021)
- [8] ZHAO Y., Green alliance threat intelligence solution, Information Security and Communications Privacy, 18, S1, pp. 23-28, (2020)
- [9] VELICKOVIC P, CUCURULL G, CASANOVA A, Et al., Graph attention networks
- [10] HUANG K Z, LIAN Y F, FENG D G, Et al., Method of cyber attack attribution based on graph model, Journal of Software, 33, 2, pp. 683-698, (2022)