Cited By
View all- Ejaz SNoor URashid Z(2022)Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning TechniquesCybernetics and Information Technologies10.2478/cait-2022-001922:2(96-113)Online publication date: 1-Jun-2022
- Zibak ASimpson A(2019)Cyber Threat Information SharingProceedings of the 14th International Conference on Availability, Reliability and Security10.1145/3339252.3340528(1-9)Online publication date: 26-Aug-2019
- Gascon HGrobauer BSchreck TRist LArp DRieck KAhn GPretschner AGhinita G(2017)Mining Attributed Graphs for Threat IntelligenceProceedings of the Seventh ACM on Conference on Data and Application Security and Privacy10.1145/3029806.3029811(15-22)Online publication date: 22-Mar-2017
- Show More Cited By