IoC Analysis Method

Harnessing TI Feeds for Exploitation Detection

Authors: Kajal Patel, Zubair Shafiq, Mateus Nogueira, Daniel Sadoc Menasché, Enrico Lovat, Taimur Kashif, Ashton Woiwood, Matheus Martins | Published: 2024-09-12
IoC Analysis Method
Machine Learning Method
Vulnerability Management

APT-MMF: An advanced persistent threat actor attribution method based on multimodal and multilevel feature fusion

Authors: Nan Xiao, Bo Lang, Ting Wang, Yikai Chen | Published: 2024-02-20
Graph Neural Network
IoC Analysis Method
Automated Threat Attribution

Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?

Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Andrea Di Sorbo, Corrado A. Visaggio, Mauro Conti | Published: 2023-06-28
IoC Analysis Method
Data Collection
evaluation metrics