1. 2019. Credential Access. https://attack.mitre.org/tactics/TA0006/ 2019. Credential Access. https://attack.mitre.org/tactics/TA0006/
2. 2021. Preventing WannaCry (WCRY) ransomware attacks using Trend Micro products. https://success.trendmicro.com/dcx/s/solution/1117391-preventing-wannacry-wcry-ransomware-attacks-using-trend-micro-products?language=en_US&sfdcIFrameOrigin=null 2021. Preventing WannaCry (WCRY) ransomware attacks using Trend Micro products. https://success.trendmicro.com/dcx/s/solution/1117391-preventing-wannacry-wcry-ransomware-attacks-using-trend-micro-products?language=en_US&sfdcIFrameOrigin=null
3. Mutual information-based feature selection for intrusion detection systems
4. Benjamin Ampel Sagar Samtani Steven Ullman and Benjamin Ampel. 2021. Linking Common Vulnerabilities and Exposures to the MITRE ATT&CK Framework: A Self-Distillation Approach. Benjamin Ampel Sagar Samtani Steven Ullman and Benjamin Ampel. 2021. Linking Common Vulnerabilities and Exposures to the MITRE ATT&CK Framework: A Self-Distillation Approach.
5. Yevonnael Andrew , Charles Lim , and Eka Budiarto . 2022 . Mapping Linux Shell Commands to MITRE ATT&CK using NLP-Based Approach . In 2022 International Conference on Electrical Engineering and Informatics (ICELTICs). 37–42 . https://doi.org/10.1109/ICELTICs56128.2022.9932097 10.1109/ICELTICs56128.2022.9932097 Yevonnael Andrew, Charles Lim, and Eka Budiarto. 2022. Mapping Linux Shell Commands to MITRE ATT&CK using NLP-Based Approach. In 2022 International Conference on Electrical Engineering and Informatics (ICELTICs). 37–42. https://doi.org/10.1109/ICELTICs56128.2022.9932097