Author:
Boyer Adam,Dogdu Erdogan,Choupani Roya,Watson Jason S.,Sanchez Diego,Ametu Alexander
Publisher
Springer Nature Switzerland
Reference22 articles.
1. Iannacone, M., et al.: Developing an ontology for cyber security knowledge graphs. In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, pp. 1–4 (2015)
2. Liu, K., Wang, F., Ding, Z., Liang, S., Yu, Z., Zhou, Y.: Recent progress of using knowledge graph for cybersecurity. Electronics 11(15), 2287 (2022)
3. Barnum, S.: Standardizing cyber threat intelligence information with the structured threat information expression (STIX). Mitre Corp. 11, 1–22 (2012)
4. Guo, Y., Liu, Z., Huang, C., Wang, N., Min, H., Guo, W., Liu, J.: A framework for threat intelligence extraction and fusion. Comput. Secur. 132, 103371 (2023)
5. Keshavarzi, M., Ghaffary, H.R.: An ontology-driven framework for knowledge representation of digital extortion attacks. Comput. Hum. Behav. 139, 107520 (2023)