共 50 条
- [2] TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports DIGITAL THREATS: RESEARCH AND PRACTICE, 2024, 5 (04):
- [3] AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 589 - 609
- [4] Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence 2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, : 193 - 204
- [5] Modeling Cyber Threat Intelligence ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 273 - 280
- [6] Cyber Threat Intelligence for "Things" 2019 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2019,
- [7] Unifying Cyber Threat Intelligence TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, TRUSTBUS 2019, 2019, 11711 : 161 - 175
- [9] Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing PROCEEDINGS OF THE 2023 ACM SYMPOSIUM ON DOCUMENT ENGINEERING, DOCENG 2023, 2023,
- [10] Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 145 - 164