QBC Inconsistency-Based Threat Intelligence IOC Recognition
With the increase in cyber-attacks, Cyber Threat Intelligence (CTI) has become a hot topic. Log detection using Indicators of Compromise (IOCs) to detect critical risks, such as compromised internal hosts, is the most common use scenario for CTI. Recognition of the IOC is an important method to defe...
Guardado en:
Autores principales: | Wenli Zeng, Zhi Liu, Yaru Yang, Gen Yang, Qin Luo |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
IEEE
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/39c69d59f7834b62b164ce284bb4480e |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
Ejemplares similares
-
Threat intelligence technology in network security situation awareness
por: Yan YIN, et al.
Publicado: (2021) -
ASYMMETRIC THREATS IN TERMS OF SAFETY OF RAILWAY SYSTEMS
por: Andrzej CHUDZIKIEWICZ, et al.
Publicado: (2021) -
To the Question on the Nature of Military Threats and Non-Military Responses
por: S. R. Tsyrendorzhjyev
Publicado: (2015) -
Intelligent Manufacturing for the Process Industry Driven by Industrial Artificial Intelligence
por: Tao Yang, et al.
Publicado: (2021) -
Machine Learning in Chemical Engineering: Strengths, Weaknesses, Opportunities, and Threats
por: Maarten R. Dobbelaere, et al.
Publicado: (2021)