Useful Cyber Threat Intelligence Relation Retrieval Using Transfer Learning

Author:

Chen Chia-Mei1ORCID,Hsu Fang-Hsuan1ORCID,Hwang Jenq-Neng2ORCID

Affiliation:

1. National Sun Yat-Sen University, Taiwan

2. University of Washington, United States

Publisher

ACM

Reference42 articles.

1. Embroker Team . "2022 Must-Know Cyber Attack Statistics and Trends." https://www.embroker.com/blog/cyber-attack-statistics/ (accessed : Jul. 4 , 2022 ). Embroker Team. "2022 Must-Know Cyber Attack Statistics and Trends." https://www.embroker.com/blog/cyber-attack-statistics/ (accessed: Jul. 4, 2022).

2. The Associated Press . " The Latest : UN warns cybercrime on rise during pandemic." https://abcnews.go.com/Health/wireStory/latest-india-reports-largest-single-day-virus-spike-70826542 (accessed: Jul. 5 ,, 2022 ). The Associated Press. "The Latest: UN warns cybercrime on rise during pandemic." https://abcnews.go.com/Health/wireStory/latest-india-reports-largest-single-day-virus-spike-70826542 (accessed: Jul. 5,, 2022).

3. Microsoft. "Cybersecurity threats to cost organizations in Asia Pacific US$1.75 trillion in economic losses." https://news.microsoft.com/apac/2018/05/18/cybersecurity-threats-to-cost-organizations-in-asia-pacific-us1-75-trillion-in-economic-losses/ (accessed June 20 2018. Microsoft. "Cybersecurity threats to cost organizations in Asia Pacific US$1.75 trillion in economic losses." https://news.microsoft.com/apac/2018/05/18/cybersecurity-threats-to-cost-organizations-in-asia-pacific-us1-75-trillion-in-economic-losses/ (accessed June 20 2018.

4. A. O'Driscoll . "25+ cyber security vulnerability statistics and facts of 2022." https://www.comparitech.com/blog/information-security/cybersecurity-vulnerability-statistics/ (accessed : Jul. 5 , 2022 ). A. O'Driscoll. "25+ cyber security vulnerability statistics and facts of 2022." https://www.comparitech.com/blog/information-security/cybersecurity-vulnerability-statistics/ (accessed: Jul. 5, 2022).

5. C. Johnson , M. Badger , D. Waltermire , J. Snyder , and C. Skorupka , " Guide to cyber threat information sharing," National Institute of Standards and Technology , 2016 . C. Johnson, M. Badger, D. Waltermire, J. Snyder, and C. Skorupka, "Guide to cyber threat information sharing," National Institute of Standards and Technology, 2016.

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3