Harnessing TI Feeds for Exploitation Detection Authors: Kajal Patel, Zubair Shafiq, Mateus Nogueira, Daniel Sadoc Menasché, Enrico Lovat, Taimur Kashif, Ashton Woiwood, Matheus Martins | Published: 2024-09-12 IoC解析手法機械学習手法脆弱性管理 2024.09.12 2025.04.03 文献データベース
APT-MMF: An advanced persistent threat actor attribution method based on multimodal and multilevel feature fusion Authors: Nan Xiao, Bo Lang, Ting Wang, Yikai Chen | Published: 2024-02-20 GNNIoC解析手法自動化された脅威帰属 2024.02.20 2025.04.03 文献データベース
Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks? Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Andrea Di Sorbo, Corrado A. Visaggio, Mauro Conti | Published: 2023-06-28 IoC解析手法データ収集評価指標 2023.06.28 2025.04.03 文献データベース