Author:
Mulwad Varish,Li Wenjia,Joshi Anupam,Finin Tim,Viswanathan Krishnamurthy
Cited by
77 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Predicting Cyber-Attacks and Identifying Perpetrators Using Machine Learning Techniques;2024 Third International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN);2024-07-18
2. LLM-based Vulnerability Sourcing from Unstructured Data;2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2024-07-08
3. Joint contrastive learning and belief rule base for named entity recognition in cybersecurity;Cybersecurity;2024-04-03
4. A survey on cybersecurity knowledge graph construction;Computers & Security;2024-01
5. Protecting Critical Infrastructure: Strategies for Managing Cybersecurity Risks in Nuclear Fusion Facilities;2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom);2023-12-21