Author of the publication

Framework of Cyber Attack Attribution Based on Threat Intelligence.

, , , , and . InterIoT/SaSeIoT, volume 190 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 92-103. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical Graph Neural Networks for Personalized Recommendations with User-Session Context., , , , , , and . SmartCom, volume 11910 of Lecture Notes in Computer Science, page 341-348. Springer, (2019)Integrating an Attention Mechanism and Deep Neural Network for Detection of DGA Domain Names., , and . ICTAI, page 848-855. IEEE, (2019)Assessing the Security of Campus Networks: The Case of Seven Universities., , , , and . Sensors, 21 (1): 306 (2021)A Weak Coupling of Semi-Supervised Learning with Generative Adversarial Networks for Malware Classification., , , , and . ICPR, page 3775-3782. IEEE, (2020)Modeling Attackers Based on Heterogenous Graph through Malicious HTTP Requests., , , , , and . CSCWD, page 391-396. IEEE, (2021)TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification*., , , , , , , and . COMPSAC, page 272-279. IEEE, (2022)Towards Network Anomaly Detection Using Graph Embedding., , , , , and . ICCS (4), volume 12140 of Lecture Notes in Computer Science, page 156-169. Springer, (2020)Framework of Cyber Attack Attribution Based on Threat Intelligence., , , , and . InterIoT/SaSeIoT, volume 190 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 92-103. (2016)MTLAT: A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER., , , , , , and . NPC, volume 12639 of Lecture Notes in Computer Science, page 43-54. Springer, (2020)FSSRE: Fusing Semantic Feature and Syntactic Dependencies Feature for threat intelligence Relation Extraction., , , , , , , and . SEKE, page 79-85. KSI Research Inc., (2021)