Harnessing TI Feeds for Exploitation Detection Authors: Kajal Patel, Zubair Shafiq, Mateus Nogueira, Daniel Sadoc Menasché, Enrico Lovat, Taimur Kashif, Ashton Woiwood, Matheus Martins | Published: 2024-09-12 IoC Analysis MethodMachine Learning MethodVulnerability Management 2024.09.12 2025.05.27 Literature Database
APT-MMF: An advanced persistent threat actor attribution method based on multimodal and multilevel feature fusion Authors: Nan Xiao, Bo Lang, Ting Wang, Yikai Chen | Published: 2024-02-20 Graph Neural NetworkIoC Analysis MethodAutomated Threat Attribution 2024.02.20 2025.05.27 Literature Database
Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks? Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Andrea Di Sorbo, Corrado A. Visaggio, Mauro Conti | Published: 2023-06-28 IoC Analysis MethodData Collectionevaluation metrics 2023.06.28 2025.05.28 Literature Database