Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Identifying authorship in malicious binaries: Features, challenges & datasets
Attributing a piece of malware to its creator typically requires threat intelligence. Binary
attribution increases the level of difficulty as it mostly relies upon the ability to disassemble …
attribution increases the level of difficulty as it mostly relies upon the ability to disassemble …
Mitre att&ck: State of the art and way forward
MITRE ATT&CK is a comprehensive framework of adversary tactics, techniques, and
procedures based on real-world observations. It has been used as a foundation for threat …
procedures based on real-world observations. It has been used as a foundation for threat …
AttacKG: Constructing technique knowledge graph from cyber threat intelligence reports
Cyber attacks are becoming more sophisticated and diverse, making attack detection
increasingly challenging. To combat these attacks, security practitioners actively summarize …
increasingly challenging. To combat these attacks, security practitioners actively summarize …
[HTML][HTML] Cyber threat attribution using unstructured reports in cyber threat intelligence
E Irshad, AB Siddiqui - Egyptian Informatics Journal, 2023 - Elsevier
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a
challenging task as attacker uses different obfuscation and deception techniques to hide its …
challenging task as attacker uses different obfuscation and deception techniques to hide its …
Automated discovery and map** ATT&CK tactics and techniques for unstructured cyber threat intelligence
L Li, C Huang, J Chen - Computers & Security, 2024 - Elsevier
As cyber attacks are growing, Cyber Threat Intelligence (CTI) enhances the ability of security
systems to resist novel cyber threats. However, since most CTI is unstructured data written in …
systems to resist novel cyber threats. However, since most CTI is unstructured data written in …
Time for action: Automated analysis of cyber threat intelligence in the wild
G Siracusano, D Sanvito, R Gonzalez… - ar** of cve to att&ck and its application to cybersecurity
Cybercriminals relentlessly pursue vulnerabilities across cyberspace to exploit software,
threatening the security of individuals, organizations, and governments. Although security …
threatening the security of individuals, organizations, and governments. Although security …
An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers
AM Pirca, HS Lallie - Computers & Security, 2023 - Elsevier
Decision-makers struggle to understand cyber-security reports, sometimes leading to
inadequate cyber-attack responses. Attack modelling techniques (AMTs) can aid cyber …
inadequate cyber-attack responses. Attack modelling techniques (AMTs) can aid cyber …
Sok: The mitre att&ck framework in research and practice
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and
techniques, has been widely adopted by the cybersecurity industry as well as by academic …
techniques, has been widely adopted by the cybersecurity industry as well as by academic …
Open source intelligence for malicious behavior discovery and interpretation
YT Huang, CY Lin, YR Guo, KC Lo… - … on Dependable and …, 2021 - ieeexplore.ieee.org
Cyber threats are one of the most pressing issues in the digital age. There has been a
consensus on deploying a proactive defense to effectively detect and respond to adversary …
consensus on deploying a proactive defense to effectively detect and respond to adversary …