共 29 条
- [11] CAI Y., Research and implementation of Trojan detection technology base on network behavior analysis, (2016)
- [12] PERRY L, SHAPIRA B, PUZIS R., NO-DOUBT: Attack attribution based on threat intelligence reports, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, pp. 80-85, (2019)
- [13] NAVEEN S, PUZIS R, ANGAPPAN K., Deep learning for threat actor attribution from threat reports, Proceedings of the International Conference on Computer, Communication and Signal Processing, pp. 1-6, (2020)
- [14] DING Z Y, LIU K, LIU B, Et al., Survey of cyber security knowledge graph, Journal of Huazhong University of Science and Technology (Natural Science Edition), 49, 7, pp. 79-91, (2021)
- [15] YANG P A, LIU B X, DU X Y., Portrait analysis of threat intelligence for attack recognition, Computer Engineering, 46, 1, pp. 136-143, (2020)
- [16] LI X, LIAN Y F, ZHANG H X, Et al., Key technologies of cyber security knowledge graph, Frontiers of Data & Computing, 3, 3, pp. 9-18, (2021)
- [17] LIU Q, ZHU P C., End-to-end threat intelligence knowledge graph construction method based on joint learning, Modern Computer, 16, pp. 16-21, (2021)
- [18] LI T., Research on key technologies for construction and application of threat intelligence knowledge graph, pp. 21-74, (2020)
- [19] WANG Y Q., Research and implementation of NSSA technology based on knowledge graph, pp. 18-68, (2020)
- [20] LU X F, ZHOU X, WANG W T, Et al., Domain-oriented topic discovery based on features extraction and topic clustering, IEEE Access, 8, pp. 93648-93662, (2020)