共 50 条
- [42] Sharing Susceptible Passwords as Cyber Threat Intelligence Feed [J]. 2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 767 - 772
- [43] Multi Platform Honeypot for Generation of Cyber Threat Intelligence [J]. PROCEEDINGS OF THE 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC 2019), 2019, : 25 - 29
- [45] Actionable Cyber Threat Intelligence for Automated Incident Response [J]. SECURE IT SYSTEMS, NORDSEC 2022, 2022, 13700 : 368 - 385
- [46] Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs [J]. PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 304 - 311
- [49] From Threat Data to Actionable Intelligence: An Exploratory Analysis of the Intelligence Cycle Implementation in Cyber Threat Intelligence Sharing Platforms [J]. ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,