TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources
暂无分享,去创建一个
Ehab Al-Shaer | Mohiuddin Ahmed | Xi Niu | Bill Chu | Ghaith Husari | E. Al-Shaer | Mohiuddin Ahmed | Bill Chu | Xi Niu | G. Husari
[1] Tudor Dumitras,et al. Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits , 2015, USENIX Security Symposium.
[2] Steven M. Bellovin,et al. Privee: An Architecture for Automatically Analyzing Web Privacy Policies , 2014, USENIX Security Symposium.
[3] Penelope Sibun,et al. A Practical Part-of-Speech Tagger , 1992, ANLP.
[4] Stephen E. Robertson,et al. Some simple effective approximations to the 2-Poisson model for probabilistic weighted retrieval , 1994, SIGIR '94.
[5] D M Faissol,et al. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches , 2009 .
[6] George A. Miller,et al. WordNet: A Lexical Database for English , 1995, HLT.
[7] Josef van Genabith,et al. Coling 2008: Proceedings of the workshop on Cross-Framework and Cross-Domain Parser Evaluation , 2008, COLING 2008.
[8] Tao Xie,et al. WHYPER: Towards Automating Risk Assessment of Mobile Applications , 2013, USENIX Security Symposium.
[9] Christopher D. Manning,et al. The Stanford Typed Dependencies Representation , 2008, CF+CDPE@COLING.
[10] Zhong Chen,et al. AutoCog: Measuring the Description-to-permission Fidelity in Android Applications , 2014, CCS.
[11] M. Stone. Cross‐Validatory Choice and Assessment of Statistical Predictions , 1976 .
[12] Eric Michael Hutchins,et al. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains , 2010 .
[13] N. F. Noy,et al. Ontology Development 101: A Guide to Creating Your First Ontology , 2001 .
[14] Ronald D. Williams,et al. Taxonomies of attacks and vulnerabilities in computer systems , 2008, IEEE Communications Surveys & Tutorials.
[15] Tudor Dumitras,et al. FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature , 2016, CCS.
[16] Zhou Li,et al. Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence , 2016, CCS.
[17] Leo Obrst,et al. Developing an Ontology of the Cyber Security Domain , 2012, STIDS.