共 50 条
- [41] Technical Guidelines for Evaluating and Selecting Data Sources for Cybersecurity Threat Intelligence [J]. PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 305 - 313
- [42] A Framework for Cyber Threat Intelligence Extraction from Raw Log Data [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 3200 - 3209
- [43] Sharing Cyber Threat Intelligence Under the General Data Protection Regulation [J]. PRIVACY TECHNOLOGIES AND POLICY, APF 2019, 2019, 11498 : 28 - 41
- [44] A Probabilistic Model to Preprocess Darknet Data for Cyber Threat Intelligence Generation [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
- [47] Enhanced Insider Threat Detection Model that Increases Data Availability [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2011, 6536 : 267 - 277
- [48] An Enhanced Threat Intelligence Driven Hybrid Model for Information Security Risk Management [J]. PROCEEDINGS 2024 IEEE 25TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, WOWMOM 2024, 2024, : 5 - 12
- [49] Enhanced Crime and Threat Intelligence Hunter with Named Entity Recognition and Sentiment Analysis [J]. SOFT COMPUTING FOR SECURITY APPLICATIONS, ICSCS 2022, 2023, 1428 : 299 - 313
- [50] Methodological Framework to Collect, Process, Analyze and Visualize Cyber Threat Intelligence Data [J]. APPLIED SCIENCES-BASEL, 2022, 12 (03):