共 50 条
- [1] A heterogeneous graph-based approach for cyber threat attribution using threat intelligence 2024 16TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING, ICMLC 2024, 2024, : 87 - 93
- [2] Framework of Cyber Attack Attribution Based on Threat Intelligence INTEROPERABILITY, SAFETY AND SECURITY IN IOT, 2017, 190 : 92 - 103
- [4] NO-DOUBT: Attack Attribution Based On Threat Intelligence Reports 2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2019, : 80 - 85
- [5] GAFM: A Knowledge Graph Completion Method Based on Graph Attention Faded Mechanism Information Processing and Management, 2022, 59 (05):
- [7] Association Analysis Of Cyber-Attack Attribution Based On Threat Intelligence PROCEEDINGS OF THE 2017 2ND JOINT INTERNATIONAL INFORMATION TECHNOLOGY, MECHANICAL AND ELECTRONIC ENGINEERING CONFERENCE (JIMEC 2017), 2017, 62 : 222 - 230
- [8] Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism Tongxin Xuebao/Journal on Communications, 2024, 45 (03): : 117 - 130
- [9] Vehicle Trajectory Prediction Method Based on Graph Models and Attention Mechanism Binggong Xuebao/Acta Armamentarii, 2023, 44 (07): : 2162 - 2170
- [10] Time Series Attention Based Transformer Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence COMPUTATIONAL SCIENCE, ICCS 2022, PT IV, 2022, : 17 - 30