相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Proactively Identifying Emerging Hacker Threats from the Dark Web
Sagar Samtani et al.
ACM Transactions on Privacy and Security (2020)
Creating Cybersecurity Knowledge Graphs From Malware After Action Reports
Aritran Piplai et al.
IEEE ACCESS (2020)
RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
Aditya Pingle et al.
PROCEEDINGS OF THE 2019 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2019) (2019)
Transformer-Based Neural Network for Answer Selection in Question Answering
Taihua Shao et al.
IEEE ACCESS (2019)
A Survey of Adversarial Machine Learning in Cyber Warfare
Vasisht Duddu
DEFENCE SCIENCE JOURNAL (2018)
Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage
Maithilee Joshi et al.
2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE) (2017)
The spreading of misinformation online
Michela Del Vicario et al.
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA (2016)
MISP - The Design and Implementation of a Collaborative Threat Intelligence Sharing Platform
Cynthia Wagner et al.
WISCS'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON INFORMATION SHARING AND COLLABORATIVE SECURITY (2016)
The Similarity Analysis of Malicious Software
Jing Liu et al.
2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016) (2016)
Graph-based malware detection using dynamic analysis
Blake Anderson et al.
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2011)
The use of artificial intelligence based techniques for intrusion detection: a review
Gulshan Kumar et al.
ARTIFICIAL INTELLIGENCE REVIEW (2010)