共 50 条
- [2] Unstructured Big Data Threat Intelligence Parallel Mining Algorithm [J]. BIG DATA MINING AND ANALYTICS, 2024, 7 (02): : 531 - 546
- [4] Mining Attributed Graphs for Threat Intelligence [J]. PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 15 - 22
- [5] Automatic Tagging of Cyber Threat Intelligence Unstructured Data using Semantics Extraction [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2019, : 197 - 199
- [6] A Data Mining Based System for Automating Creation of Cyber Threat Intelligence [J]. 9TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS'21), 2021,
- [7] Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study [J]. 2022 IEEE 33RD INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2022), 2022, : 181 - 192
- [8] Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence [J]. IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 7 - 12
- [9] Automatic Generation of Malware Threat Intelligence from Unstructured Malware Traces [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I, 2021, 398 : 44 - 61
- [10] From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence [J]. IEEE ACCESS, 2020, 8 : 19089 - 19099