Author:
Othman Refat,Russo Barbara
Publisher
Springer Nature Switzerland
Reference14 articles.
1. C. Research. 38% increase in 2022 global cyberattacks (2022). https://blog.checkpoint.com/2023/01/05/38-increase-in-2022-global-cyberattacks/. Accessed 28 Apr 2023
2. NVD. NVD vulnerabilities (2021). https://nvd.nist.gov/vuln. Accessed 2 May 2023
3. Sun, N., Ding, M., Jiang, J., et al.: Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives. IEEE Commun. Surv. Tutor. (2023)
4. Jiang, T., Shen, G., Guo, C., et al.: BFLS: blockchain and federated learning for sharing threat detection models as cyber threat intelligence. Comput. Netw. 224, 109604 (2023)
5. Elder, S., Zahan, N., Shu, R., et al.: Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application. Empirical Softw. Eng. 27(6), 154 (2022)