Author:
Liu Chenjing,Wang Junfeng,Chen Xiangru
Funder
National Natural Science Foundation of China
Basic Research Program of Jiangsu Province
Sichuan Province Youth Science and Technology Innovation Team
National Key Research and Development Program of China
Reference47 articles.
1. G. Husari, E. Al-Shaer, M. Ahmed, B. Chu, X. Niu, Ttpdrill: Automatic and accurate extraction of threat actions from unstructured text of cti sources, in: Proceedings of the 33rd Annual Computer Security Applications Conference, 2017, pp. 103–115.
2. Cyber security threat modeling based on the MITRE enterprise att&ck matrix;Xiong;Softw. Syst. Model.,2021
3. Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack;Ahmad;Comput. Secur.,2019
4. A new semantic-based feature selection method for spam filtering;Mendez;Appl. Soft Comput.,2019
5. A3CMal: Generating adversarial samples to force targeted misclassification by reinforcement learning;Fang;Appl. Soft Comput.,2021
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献