1. Detection of advanced persistent threat using machine-learning correlation analysis;Ghafir;Future Generation Computer Systems,2018
2. Cyber threat intelligence sharing: Survey and research directions;Wagner;Computers & Security,2019
3. Cyber kill chain-based taxonomy of advanced persistent threat actors: Analogy of tactics, techniques, and procedures;Bahrami;Journal of Information Processing Systems,2019
4. IoCMiner: Automatic extraction of indicators of compromise from twitter;Niakanlahiji,2019
5. PTE: Predictive text embedding through large-scale heterogeneous text networks;Tang,2015