共 50 条
- [1] Framework of Cyber Attack Attribution Based on Threat Intelligence [J]. INTEROPERABILITY, SAFETY AND SECURITY IN IOT, 2017, 190 : 92 - 103
- [2] Cyber-attack group analysis method based on association of cyber-attack information [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 260 - 280
- [5] NO-DOUBT: Attack Attribution Based On Threat Intelligence Reports [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2019, : 80 - 85
- [6] Cyber-Attack Risks Analysis Based on Attack-Defense Trees [J]. ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 667 - 678
- [7] Cyber-Attack Features for Detecting Cyber Threat Incidents from Online News [J]. PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE (CRC), 2018,
- [8] A heterogeneous graph-based approach for cyber threat attribution using threat intelligence [J]. 2024 16TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING, ICMLC 2024, 2024, : 87 - 93