4.5 Article

Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence

Related references

Note: Only part of the references are listed.
Proceedings Paper Computer Science, Theory & Methods

Malware Detection in Cloud Infrastructures using Convolutional Neural Networks

Mahmoud Abdelsalam et al.

PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD) (2018)

Editorial Material Computer Science, Hardware & Architecture

Attribute-Based Access Control

Vincent C. Hu et al.

COMPUTER (2015)

Proceedings Paper Computer Science, Theory & Methods

Path Conditions and Principal Matching: A New Approach to Access Control

Jason Crampton et al.

PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14) (2014)

Review Computer Science, Hardware & Architecture

Intrusion detection system: A comprehensive review

Hung-Jen Liao et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Proceedings Paper Computer Science, Theory & Methods

Relationship-based Access Control for Online Social Networks: Beyond User-to-User Relationships

Yuan Cheng et al.

PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012) (2012)

Article Computer Science, Hardware & Architecture

Social phishing

Tom N. Jagatic et al.

COMMUNICATIONS OF THE ACM (2007)