Related references
Note: Only part of the references are listed.The rise of machine learning for detection and classification of malware: Research developments, trends and challenges
Daniel Gibert et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)
A Comparative Analysis of Cyber-Threat Intelligence Sources, Formats and Languages
Andrew Ramsdale et al.
ELECTRONICS (2020)
Deep learning methods in network intrusion detection: A survey and an objective comparison
Sunanda Gamage et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)
Software Vulnerability Detection Using Deep Neural Networks: A Survey
Guanjun Lin et al.
PROCEEDINGS OF THE IEEE (2020)
The Challenges of Leveraging Threat Intelligence to Stop Data Breaches
Amani Ibrahim et al.
FRONTIERS IN COMPUTER SCIENCE (2020)
A Multi-Vocal Review of Security Orchestration
Chadni Islam et al.
ACM COMPUTING SURVEYS (2019)
An ensemble learning approach for XSS attack detection with domain knowledge and threat intelligence
Yun Zhou et al.
COMPUTERS & SECURITY (2019)
A machine learning framework for investigating data breaches based on semantic analysis of adversary's attack patterns in threat intelligence repositories
Umara Noor et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
Actionable threat intelligence for digital forensics readiness
Nikolaos Serketzis et al.
INFORMATION AND COMPUTER SECURITY (2019)
A survey on technical threat intelligence in the age of sophisticated cyber attacks
Wiem Tounsi et al.
COMPUTERS & SECURITY (2018)
Panning for gold: Automatically analysing online social engineering attack surfaces
Matthew Edwards et al.
COMPUTERS & SECURITY (2017)
Data-driven analytics for cyber-threat intelligence and information sharing
Sara Qamar et al.
COMPUTERS & SECURITY (2017)
A survey of network anomaly detection techniques
Mohiuddin Ahmed et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)