Clustering Using a Similarity Measure Approach Based on Semantic Analysis of Adversary Behaviors
暂无分享,去创建一个
Aiping Li | Zhaoyun Ding | Wenhao Wang | Bin Liu | Cheng Zhu | BenFu Tang | Bin Liu | Zhaoyun Ding | Aiping Li | Cheng Zhu | Wenhao Wang | BenFu Tang
[1] Brian W. Kernighan,et al. An efficient heuristic procedure for partitioning graphs , 1970, Bell Syst. Tech. J..
[2] Cumberland Emergency,et al. Framework for Improving Critical Infrastructure Cybersecurity News From Down Under , 2014 .
[3] Vasileios Mavroeidis,et al. Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence , 2017, 2017 European Intelligence and Security Informatics Conference (EISIC).
[4] Yizhou Sun,et al. Meta-Path-Based Search and Mining in Heterogeneous Information Networks , 2013 .
[5] Robin A. Gandhi,et al. Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political , 2011, IEEE Technology and Society Magazine.
[6] Ni Lao,et al. Fast query execution for retrieval models based on path-constrained random walks , 2010, KDD.
[7] M E J Newman,et al. Finding and evaluating community structure in networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.
[8] Alex Pothen,et al. PARTITIONING SPARSE MATRICES WITH EIGENVECTORS OF GRAPHS* , 1990 .
[9] Philip S. Yu,et al. PathSim , 2011, Proc. VLDB Endow..
[10] Jennifer Widom,et al. SimRank: a measure of structural-context similarity , 2002, KDD.
[11] Shamik Sural,et al. Similarity between Euclidean and cosine angle distance for nearest neighbor queries , 2004, SAC '04.
[12] Jennifer Widom,et al. Scaling personalized web search , 2003, WWW '03.
[13] Gregory A. Witte,et al. Framework for Improving Critical Infrastructure Cybersecurity | NIST , 2014 .
[14] Franz Schweiggert,et al. TitleFinder: extracting the headline of news web pages based on cosine similarity and overlap scoring similarity , 2012, WIDM '12.