共 45 条
- [21] Mandiant, 2013, OPENIOC
- [22] Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence [J]. 2017 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2017, : 91 - 98
- [23] PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts [J]. 2013 12TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2013), VOL 2, 2013, : 60 - 65
- [24] Metcalf Leigh., 2015, P 2 ACM WORKSH INF S, P13, DOI 10.1145/2808128.2808129
- [25] Mikolov Tomas, 2013, ARXIV, DOI 10.48550/arXiv.1301.3781
- [26] POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1795 - 1812
- [27] Min B., 2012, Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, P1027
- [28] MISP, 2021, MISP-Open Source Threat Intelligence Platform & Open Standards For Threat Information Sharing
- [29] Mittal S, 2016, PROCEEDINGS OF THE 2016 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING ASONAM 2016, P860, DOI 10.1109/ASONAM.2016.7752338
- [30] Mulwad V., 2011, 2011 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies, P257, DOI 10.1109/WI-IAT.2011.26