QBC Inconsistency-Based Threat Intelligence IOC Recognition
With the increase in cyber-attacks, Cyber Threat Intelligence (CTI) has become a hot topic. Log detection using Indicators of Compromise (IOCs) to detect critical risks, such as compromised internal hosts, is the most common use scenario for CTI. Recognition of the IOC is an important method to defe...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | article |
Language: | EN |
Published: |
IEEE
2021
|
Subjects: | |
Online Access: | https://doaj.org/article/39c69d59f7834b62b164ce284bb4480e |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!