共 77 条
[1]
From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence
[J].
IEEE ACCESS,
2020, 8
:19089-19099
[3]
Alkawaz MH, 2020, 2020 16TH IEEE INTERNATIONAL COLLOQUIUM ON SIGNAL PROCESSING & ITS APPLICATIONS (CSPA 2020), P111, DOI [10.1109/cspa48992.2020.9068728, 10.1109/CSPA48992.2020.9068728]
[4]
[Anonymous], 2017, P IEEE 7 ANN COMP CO
[5]
Begum A., 2020, ADV DECISION SCI SEC, P587, DOI [10.1007/978-3-030-24318-0_68, DOI 10.1007/978-3-030-24318-0_68]
[6]
Classification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Literature Review
[J].
DEVELOPMENTS AND ADVANCES IN DEFENSE AND SECURITY,
2020, 152
:51-64
[8]
Bouzoubaa K, 2021, INT J ADV COMPUT SC, V12, P131