1. Rawan Al-Shaer , Jonathan M Spring , and Eliana Christou . 2020 . Learning the Associations of MITRE ATT&CK Adversarial Techniques. In IEEE Conference on Communications and Network Security (CNS). IEEE. Rawan Al-Shaer, Jonathan M Spring, and Eliana Christou. 2020. Learning the Associations of MITRE ATT&CK Adversarial Techniques. In IEEE Conference on Communications and Network Security (CNS). IEEE.
2. Hyrum S. Anderson and Phil Roth . 2018 . EMBER : An Open Dataset for Training Static PE Malware Machine Learning Models . arxiv:1804.04637 [cs.CR] Hyrum S. Anderson and Phil Roth. 2018. EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models. arxiv:1804.04637 [cs.CR]
3. Martin Atzmueller and Rushed Kanawati . 2022 . Explainability in Cyber Security using Complex Network Analysis: A Brief Methodological Overview . In European Interdisciplinary Cybersecurity Conference. ACM. Martin Atzmueller and Rushed Kanawati. 2022. Explainability in Cyber Security using Complex Network Analysis: A Brief Methodological Overview. In European Interdisciplinary Cybersecurity Conference. ACM.
4. Nicola Capuano , Giuseppe Fenza , Vincenzo Loia , and Claudio Stanzione . 2022. Explainable Artificial Intelligence in CyberSecurity: A Survey . IEEE Access ( 2022 ). Nicola Capuano, Giuseppe Fenza, Vincenzo Loia, and Claudio Stanzione. 2022. Explainable Artificial Intelligence in CyberSecurity: A Survey. IEEE Access (2022).
5. Veronica Chierzi and Fernando Mercês . 2021 . Evolution of IoT Linux Malware: A MITRE ATT&CK TTP Based Approach. In APWG Symposium on eCrime. Veronica Chierzi and Fernando Mercês. 2021. Evolution of IoT Linux Malware: A MITRE ATT&CK TTP Based Approach. In APWG Symposium on eCrime.