1. Knowledge Mining in Cybersecurity: From Attack to Defense;Khandakar Akbar;Data, Applications Security, and Privacy,2022
2. IoTTPS: Ensemble RKSVM Model-Based Internet of Things Threat Protection System;Urooj Akram;Sensors,2023
3. Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI;Md Alam;Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses,2022