Author:
Long Zi,Tan Lianzhi,Zhou Shengping,He Chaoyang,Liu Xin
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. FOCUS: Fatigue-Reducing IOCs Through Prioritization and Scoring;2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech);2023-11-14
2. CDTier: A Chinese Dataset of Threat Intelligence Entity Relationships;IEEE Transactions on Sustainable Computing;2023-10
3. Cyber vulnerabilities surveillance via web-scraped specialized documents;2023 25th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC);2023-09-11
4. DACTI: a Generation-Based Data Augmentation Method for Cyber Threat Intelligence;2023 8th International Conference on Data Science in Cyberspace (DSC);2023-08-18
5. Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives;IEEE Communications Surveys & Tutorials;2023