HGHAN: Hacker group identification based on heterogeneous graph attention network

Y Xu, Y Fang, C Huang, Z Liu - Information Sciences, 2022 - Elsevier
The hacker group identification is an important pre-work for tasks such as hacking tracing,
criminal portraits. The current hacker identification mainly relies on fingerprints and clue …

CBR‐Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data‐Driven Website Defacement Analysis

ML Han, BI Kwak, HK Kim - Security and Communication …, 2019 - Wiley Online Library
Criminal profiling is a useful technique to identify the most plausible suspects based on the
evidence discovered at the crime scene. Similar to offline criminal profiling, in‐depth …

Hacker group identification based on dynamic heterogeneous graph node update

Y Xu, Y Fang, C Huang, Z Liu, W Cao - Applied Soft Computing, 2024 - Elsevier
This paper addresses the critical task of hacker identification within the cyber traceability
system. While the latest hacker group identification method based on the heterogeneous …

[HTML][HTML] Case-based reasoning for hidden property analysis of judgment debtors

H Zhang, Z Zhang, L Zhou, S Wu - Mathematics, 2021 - mdpi.com
Many judgment debtors try to evade, confront, and delay law enforcement using concealing
and transferring their property to resist law enforcement in China. The act of hiding property …

Cyber-attack group analysis method based on association of cyber-attack information

K Son, B Kim, T Lee - KSII Transactions on Internet and Information …, 2020 - koreascience.kr
Cyber-attacks emerge in a more intelligent way, and various security technologies are
applied to respond to such attacks. Still, more and more people agree that individual …

Cyberattack intensity forecasting on informatization objects of critical infrastructures

YM Krakovsky, AN Luzgin… - IOP Conference Series …, 2019 - iopscience.iop.org
In regulatory documents of recent years in the field of information security, much attention is
paid to information systems of critical infrastructures. This, in turn, justifies the need for …

[PDF][PDF] Multi-Agent Case-Based Reasoning: a Network Intrusion Detection System.

JM Schoenborn, KD Althoff - LWDA, 2022 - ceur-ws.org
We propose a multi-agent case-based reasoning system to detect malicious traffic in a
network. We introduce ten topic agents, including nine different attack categories and one …

Interval forecasting of cyber-attacks on industrial control systems

YM Ivanyo, YM Krakovsky… - IOP Conference Series …, 2018 - iopscience.iop.org
At present, cyber-security issues of industrial control systems occupy one of the key niches
in a state system of planning and management Functional disruption of these systems via …

Case-Based Reasoning and Computer Vision for Cybersecurity: A Short Review

ND Tchomte, F Tchakounte, I Abbo - Global Perspectives on the …, 2024 - igi-global.com
The integration of case-based reasoning (CBR) and computer vision (CV) holds significant
promise for enhancing cybersecurity, enabling the analysis and interpretation of visual data …

MITRE ATT&CK 모델을 이용한 사이버 공격 그룹 분류.

최창희, 신찬호, 신성욱 - Journal of Internet Computing & …, 2022 - search.ebscohost.com
요 약정보통신 환경의 발전으로 인하여 군사 시설의 환경 또한 많은 발전이 이루어지고 있다.
이에 비례하여 사이버 위협도 증가하고있으며, 특히 기존 시그니처 기반 사이버 방어체계로는 …