1. 2023. https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/our-work/threat-report-attck-mapper-tram/
2. Basel Abdeen, Ehab Al-Shaer, Anoop Singhal, Latifur Khan, and Kevin Hamlen. 2023. SMET: Semantic Mapping of CVE to ATT&CK and Its Application to Cybersecurity. In IFIP Annual Conference on Data and Applications Security and Privacy. Springer, 243--260.
3. Md Tanvirul Alam, Dipkamal Bhusal, Youngja Park, and Nidhi Rastogi. 2022. Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI. arXiv preprint arXiv:2211.01753 (2022).
4. Md Tanvirul Alam Dipkamal Bhusal Youngja Park and Nidhi Rastogi. 2023. Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI. arXiv:2211.01753 [cs.CR]
5. Effectiveness/efficiency tradeoffs for candidate generation in multi-stage retrieval architectures