共 50 条
- [2] Risk Assessment of Sharing Cyber Threat Intelligence [J]. COMPUTER SECURITY, ESORICS 2020 INTERNATIONAL WORKSHOPS, 2020, 12580 : 92 - 113
- [4] Towards Collaborative Cyber Threat Intelligence for Security Management [J]. ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 339 - 346
- [6] Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence [J]. ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
- [7] Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence [J]. 2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, : 193 - 204
- [8] The third international workshop on cyber threat intelligence management (CyberTIM) [J]. ACM International Conference Proceeding Series, 2020,
- [9] Modeling Cyber Threat Intelligence [J]. ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 273 - 280
- [10] Unifying Cyber Threat Intelligence [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, TRUSTBUS 2019, 2019, 11711 : 161 - 175