Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on cybersecurity knowledge graph construction
X Zhao, R Jiang, Y Han, A Li, Z Peng - Computers & Security, 2024 - Elsevier
The development of key technologies of knowledge graph (KG) has promoted the
development of machine cognition technology, and the combination of KG and industry as …
development of machine cognition technology, and the combination of KG and industry as …
[HTML][HTML] Recent progress of using knowledge graph for cybersecurity
In today's dynamic complex cyber environments, Cyber Threat Intelligence (CTI) and the risk
of cyberattacks are both increasing. This means that organizations need to have a strong …
of cyberattacks are both increasing. This means that organizations need to have a strong …
Cyber threat intelligence model: an evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence
Threat intelligence is the provision of evidence-based knowledge about existing or potential
threats. Benefits of threat intelligence include improved efficiency and effectiveness in …
threats. Benefits of threat intelligence include improved efficiency and effectiveness in …
The rise of “malware”: Bibliometric analysis of malware study
Malicious software (malware) is a computer program designed to create harmful and
undesirable effects. It considered as one of the many dangerous threats for Internet users …
undesirable effects. It considered as one of the many dangerous threats for Internet users …
Early detection of cybersecurity threats using collaborative cognition
The early detection of cybersecurity events such as attacks is challenging given the
constantly evolving threat landscape. Even with advanced monitoring, sophisticated …
constantly evolving threat landscape. Even with advanced monitoring, sophisticated …
A review of knowledge graph application scenarios in cyber security
Facing the dynamic complex cyber environments, internal and external cyber threat
intelligence, and the increasing risk of cyber-attack, knowledge graphs show great …
intelligence, and the increasing risk of cyber-attack, knowledge graphs show great …
Data-driven threat hunting using sysmon
Threat actors can be persistent, motivated and agile, and they leverage a diversified and
extensive set of tactics, techniques, and procedures to attain their goals. In response to that …
extensive set of tactics, techniques, and procedures to attain their goals. In response to that …
Threatkg: A threat knowledge graph for automated open-source cyber threat intelligence gathering and management
Despite the increased adoption of open-source cyber threat intelligence (OSCTI) for
acquiring knowledge about cyber threats, little effort has been made to harvest knowledge …
acquiring knowledge about cyber threats, little effort has been made to harvest knowledge …
A framework for conceptual characterization of ontologies and its application in the cybersecurity domain
BF Martins, LJ Serrano Gil, JF Reyes Román… - Software and Systems …, 2022 - Springer
Organizations are actively seeking efficient solutions for the management and protection of
their assets. However, Cybersecurity is a vast and complex domain, especially for large …
their assets. However, Cybersecurity is a vast and complex domain, especially for large …
Conceptual characterization of cybersecurity ontologies
Cybersecurity is known as the practice of protecting systems from digital attacks.
Organizations are seeking efficient solutions for the management and protection of their …
Organizations are seeking efficient solutions for the management and protection of their …