4.7 Article

SmartValidator: A framework for automatic identification and classification of cyber threat data

Related references

Note: Only part of the references are listed.
Review Computer Science, Hardware & Architecture

The rise of machine learning for detection and classification of malware: Research developments, trends and challenges

Daniel Gibert et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Computer Science, Information Systems

A Comparative Analysis of Cyber-Threat Intelligence Sources, Formats and Languages

Andrew Ramsdale et al.

ELECTRONICS (2020)

Article Computer Science, Hardware & Architecture

Deep learning methods in network intrusion detection: A survey and an objective comparison

Sunanda Gamage et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Engineering, Electrical & Electronic

Software Vulnerability Detection Using Deep Neural Networks: A Survey

Guanjun Lin et al.

PROCEEDINGS OF THE IEEE (2020)

Review Computer Science, Interdisciplinary Applications

The Challenges of Leveraging Threat Intelligence to Stop Data Breaches

Amani Ibrahim et al.

FRONTIERS IN COMPUTER SCIENCE (2020)

Review Computer Science, Theory & Methods

A Multi-Vocal Review of Security Orchestration

Chadni Islam et al.

ACM COMPUTING SURVEYS (2019)

Article Computer Science, Information Systems

An ensemble learning approach for XSS attack detection with domain knowledge and threat intelligence

Yun Zhou et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Theory & Methods

A machine learning framework for investigating data breaches based on semantic analysis of adversary's attack patterns in threat intelligence repositories

Umara Noor et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

Actionable threat intelligence for digital forensics readiness

Nikolaos Serketzis et al.

INFORMATION AND COMPUTER SECURITY (2019)

Article Computer Science, Information Systems

A survey on technical threat intelligence in the age of sophisticated cyber attacks

Wiem Tounsi et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Information Systems

Panning for gold: Automatically analysing online social engineering attack surfaces

Matthew Edwards et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Information Systems

Data-driven analytics for cyber-threat intelligence and information sharing

Sara Qamar et al.

COMPUTERS & SECURITY (2017)

Review Computer Science, Hardware & Architecture

A survey of network anomaly detection techniques

Mohiuddin Ahmed et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)