共 10 条
[1]
Bouwman X, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P433
[2]
Clarke V., 2015, QUALITATIVE PSYCHOL, V12, P297, DOI [DOI 10.1007/978-94-007-0753-5, 10.1007/978-94-007-0753-5]
[3]
A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity
[J].
2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA),
2020,
:2596-2604
[4]
Dorton S. L., 2021, CISC VIS NETW IND GL
[5]
Quality Evaluation of Cyber Threat Intelligence Feeds
[J].
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT II,
2020, 12147
:277-296
[6]
Lif P, 2017, 2017 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), DOI 10.1109/CyberSA.2017.8073388
[10]
Wu H, 2020, PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), P1370, DOI [10.1109/itnec48623.2020.9085102, 10.1109/ITNEC48623.2020.9085102]