Author of the publication

Framework of Cyber Attack Attribution Based on Threat Intelligence.

, , , , and . InterIoT/SaSeIoT, volume 190 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 92-103. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical Graph Neural Networks for Personalized Recommendations with User-Session Context., , , , , , and . SmartCom, volume 11910 of Lecture Notes in Computer Science, page 341-348. Springer, (2019)Particle Filter Based Multi-Camera Integration for Face 3D-Pose Tracking., , , and . Int. J. Wavelets Multiresolution Inf. Process., 4 (4): 677-690 (2006)Assessing the Security of Campus Networks: The Case of Seven Universities., , , , and . Sensors, 21 (1): 306 (2021)Integrating an Attention Mechanism and Deep Neural Network for Detection of DGA Domain Names., , and . ICTAI, page 848-855. IEEE, (2019)A Weak Coupling of Semi-Supervised Learning with Generative Adversarial Networks for Malware Classification., , , , and . ICPR, page 3775-3782. IEEE, (2020)TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification*., , , , , , , and . COMPSAC, page 272-279. IEEE, (2022)Towards Network Anomaly Detection Using Graph Embedding., , , , , and . ICCS (4), volume 12140 of Lecture Notes in Computer Science, page 156-169. Springer, (2020)Modeling Attackers Based on Heterogenous Graph through Malicious HTTP Requests., , , , , and . CSCWD, page 391-396. IEEE, (2021)Framework of Cyber Attack Attribution Based on Threat Intelligence., , , , and . InterIoT/SaSeIoT, volume 190 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 92-103. (2016)MTLAT: A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER., , , , , , and . NPC, volume 12639 of Lecture Notes in Computer Science, page 43-54. Springer, (2020)