共 61 条
[1]
Akhgar B., 2017, P EST AC SEC SCI 16
[2]
Almukaynizi Mohammed, 2017, 2017 International Conference on Cyber-Conflict (CyCon U.S.), P82, DOI 10.1109/CYCONUS.2017.8167501
[3]
Almukaynizi M, 2018, 2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P31, DOI 10.1109/ISI.2018.8587334
[4]
Alsmadi I., 2019, The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics
[5]
Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach
[J].
2020 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI),
2020,
:144-149
[6]
Arnold Nolan, 2019, 2019 IEEE International Conference on Intelligence and Security Informatics (ISI), P92, DOI 10.1109/ISI.2019.8823501
[7]
Biswas B, 2018, PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), P1752
[8]
Chayal N.M., 2020, DATA SCI INTELLIGENT
[9]
Cherqi O, 2018, 2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P79, DOI 10.1109/ISI.2018.8587311