3.8 Proceedings Paper

Generating Fake Cyber Threat Intelligence Using Transformer-Based Models

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Proactively Identifying Emerging Hacker Threats from the Dark Web

Sagar Samtani et al.

ACM Transactions on Privacy and Security (2020)

Article Computer Science, Information Systems

Creating Cybersecurity Knowledge Graphs From Malware After Action Reports

Aritran Piplai et al.

IEEE ACCESS (2020)

Proceedings Paper Computer Science, Artificial Intelligence

RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement

Aditya Pingle et al.

PROCEEDINGS OF THE 2019 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2019) (2019)

Article Computer Science, Information Systems

Transformer-Based Neural Network for Answer Selection in Question Answering

Taihua Shao et al.

IEEE ACCESS (2019)

Article Multidisciplinary Sciences

A Survey of Adversarial Machine Learning in Cyber Warfare

Vasisht Duddu

DEFENCE SCIENCE JOURNAL (2018)

Proceedings Paper Computer Science, Theory & Methods

Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage

Maithilee Joshi et al.

2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE) (2017)

Article Multidisciplinary Sciences

The spreading of misinformation online

Michela Del Vicario et al.

PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA (2016)

Proceedings Paper Computer Science, Information Systems

MISP - The Design and Implementation of a Collaborative Threat Intelligence Sharing Platform

Cynthia Wagner et al.

WISCS'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON INFORMATION SHARING AND COLLABORATIVE SECURITY (2016)

Proceedings Paper Computer Science, Information Systems

The Similarity Analysis of Malicious Software

Jing Liu et al.

2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016) (2016)

Article Computer Science, Information Systems

Graph-based malware detection using dynamic analysis

Blake Anderson et al.

JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2011)

Review Computer Science, Artificial Intelligence

The use of artificial intelligence based techniques for intrusion detection: a review

Gulshan Kumar et al.

ARTIFICIAL INTELLIGENCE REVIEW (2010)