Author:
Jaafar Fehmi,Avellaneda Florent,Alikacem El-Hackemi
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Semantic Similarities for Honeypot Collected Linux Shell Commands;2023 11th International Conference on Information and Communication Technology (ICoICT);2023-08-23
2. Enhancing Cyber Attribution through Behavior Similarity Detection on Linux Shell Honeypots with ATT&CK Framework;2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs);2023-08-22
3. Extending Threat Playbooks for Cyber Threat Intelligence: A Novel Approach for APT Attribution;2023 11th International Symposium on Digital Forensics and Security (ISDFS);2023-05-11
4. Cyber threat attribution using unstructured reports in cyber threat intelligence;Egyptian Informatics Journal;2023-03
5. An Integrated Formal Description Method for Network Attacks;2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT);2022-08