共 47 条
[21]
AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports
[J].
COMPUTER SECURITY - ESORICS 2022, PT I,
2022, 13554
:589-609
[22]
Libicki MC, 2007, CONQUEST IN CYBERSPACE: NATIONAL SECURITY AND INFORMATION WARFARE, P1, DOI 10.1017/CBO9780511804250
[24]
Matteo C, 2019, Journal of Information Warfare, V18, P83
[28]
Industry 4.0: Industrial Internet of Things (IIOT)
[J].
DIGITAL TWIN PARADIGM FOR SMARTER SYSTEMS AND ENVIRONMENTS: THE INDUSTRY USE CASES,
2020, 117
:129-164
[29]
Oxlund B., 2016, Anthropology Now, V8, P1, DOI [10.1080/19428200.2016.1202574, DOI 10.1080/19428200.2016.1202574]
[30]
Pant K, 2020, AACL-IJCNLP 2020: THE 1ST CONFERENCE OF THE ASIA-PACIFIC CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS AND THE 10TH INTERNATIONAL JOINT CONFERENCE ON NATURAL LANGUAGE PROCESSING: PROCEEDINGS OF THE STUDENT RESEARCH WORKSHOP, P37