AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports
- 25 September 2022
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- Threat detection and investigation with system-level provenance graphs: A surveyComputers & Security, 2021
- Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation SemanticsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2020
- EIGERPublished by Association for Computing Machinery (ACM) ,2019
- POIROTPublished by Association for Computing Machinery (ACM) ,2019
- A Supervised Machine Learning Based Approach for Automatically Extracting High-Level Threat Intelligence from Unstructured SourcesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2018
- Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat IntelligencePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2018
- ChainSmith: Automatically Learning the Semantics of Malicious Campaigns by Mining Threat Intelligence ReportsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2018
- TTPDrillPublished by Association for Computing Machinery (ACM) ,2017
- Semi-Automated Information Extraction from Unstructured Threat AdvisoriesPublished by Association for Computing Machinery (ACM) ,2017
- Acing the IOC GamePublished by Association for Computing Machinery (ACM) ,2016