1. Cyber threat intelligence–issue and challenges;Abu;Indonesian Journal of Electrical Engineering and Computer Science,2018
2. Looking beyond iocs: automatically extracting attack patterns from external CTI;Alam;arXiv preprint arXiv:221101753,2022
3. Paired: an explainable lightweight android malware detection system;Alani;IEEE Access,2022
4. Signature verification using a “siamese” time delay neural network;Bromley;Int. J. Pattern Recognit Artif Intell.,1993
5. Brown T.B., Mann B., Ryder N., Subbiah M., Kaplan J., Dhariwal P., Neelakantan A., Shyam P., Sastry G., Askell A., Agarwal S., Herbert-Voss A., Krueger G., Henighan T., Child R., Ramesh A., Ziegler D.M., Wu J., Winter C., Hesse C., Chen M., Sigler E., Litwin M., Gray S., Chess B., Clark J., Berner C., McCandlish S., Radford A., Sutskever I., Amodei D.. Language models are few-shot learners. 2020.