共 50 条
- [2] Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence 2017 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2017, : 91 - 98
- [3] Data Poisoning: Achilles Heel of Cyber Threat Intelligence Systems PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, : 221 - 230
- [4] A heterogeneous graph-based approach for cyber threat attribution using threat intelligence 2024 16TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING, ICMLC 2024, 2024, : 87 - 93
- [5] Modeling Cyber Threat Intelligence ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 273 - 280
- [6] Automated Cyber Threat Intelligence Generation from Honeypot Data INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 591 - 598
- [7] Using Cyber Threat Intelligence in SDN Security 2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 377 - 382
- [8] Enhancing Cyber Threat Intelligence with Named Entity Recognition using BERT-CRF IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 7532 - 7537
- [9] An Effective Approach of Named Entity Recognition for Cyber Threat Intelligence PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 1370 - 1374
- [10] Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence 2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2018, : 1 - 6