Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence
暂无分享,去创建一个
Zhou Li | Raheem A. Beyah | XiaoFeng Wang | Luyi Xing | Xiaojing Liao | Kan Yuan | Xiaofeng Wang | R. Beyah | Luyi Xing | Xiaojing Liao | Zhou Li | Kan Yuan
[1] Hai-Xin Duan,et al. Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[2] Satoshi Sekine,et al. A survey of named entity recognition and classification , 2007 .
[3] Rada Mihalcea,et al. TextRank: Bringing Order into Text , 2004, EMNLP.
[4] Daniel S. Weld,et al. Open Information Extraction Using Wikipedia , 2010, ACL.
[5] Oren Etzioni,et al. Open Language Learning for Information Extraction , 2012, EMNLP.
[6] Burr Settles,et al. ABNER: an open source tool for automatically tagging genes, proteins and other entity names in text , 2005 .
[7] Marco Balduzzi,et al. Automatic Extraction of Indicators of Compromise for Web Applications , 2016, WWW.
[8] Christopher D. Manning,et al. Incorporating Non-local Information into Information Extraction Systems by Gibbs Sampling , 2005, ACL.
[9] Steven M. Bellovin,et al. Privee: An Architecture for Automatically Analyzing Web Privacy Policies , 2014, USENIX Security Symposium.
[10] Xiaofeng Wang,et al. UIPicker: User-Input Privacy Identification in Mobile Applications , 2015, USENIX Security Symposium.
[11] Tao Xie,et al. WHYPER: Towards Automating Risk Assessment of Mobile Applications , 2013, USENIX Security Symposium.
[12] Danqi Chen,et al. A Fast and Accurate Dependency Parser using Neural Networks , 2014, EMNLP.
[13] Tudor Dumitras,et al. Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits , 2015, USENIX Security Symposium.
[14] Xiaoli Li,et al. Eliminating noisy information in Web pages for data mining , 2003, KDD '03.
[15] Nguyen Bach,et al. A Review of Relation Extraction , 2007 .
[16] Aron Culotta,et al. Dependency Tree Kernels for Relation Extraction , 2004, ACL.
[17] Thomas Gärtner,et al. On Graph Kernels: Hardness Results and Efficient Alternatives , 2003, COLT.
[18] Dan Roth,et al. An NLP Curator (or: How I Learned to Stop Worrying and Love NLP Pipelines) , 2012, LREC.
[19] Zhong Chen,et al. AutoCog: Measuring the Description-to-permission Fidelity in Android Applications , 2014, CCS.
[20] Tao Zhang,et al. AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications , 2015, SPSM@CCS.
[21] 神薗 雅紀,et al. Structured Threat Information eXpression で記述された情報のモデル化 , 2018 .
[22] Jan Ramon,et al. Expressivity versus efficiency of graph kernels , 2003 .
[23] Xiangyu Zhang,et al. SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps , 2015, USENIX Security Symposium.
[24] Leo Obrst,et al. Developing an Ontology of the Cyber Security Domain , 2012, STIDS.
[25] A. John. MINING GRAPH DATA , 2022 .