ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2101.07769
  4. Cited By
A System for Automated Open-Source Threat Intelligence Gathering and
  Management

A System for Automated Open-Source Threat Intelligence Gathering and Management

19 January 2021
Peng Gao
Xiaoyuan Liu
E. Choi
Bhavna Soman
Chinmaya Mishra
K. Farris
D. Song
ArXivPDFHTML

Papers citing "A System for Automated Open-Source Threat Intelligence Gathering and Management"

8 / 8 papers shown
Title
MultiKG: Multi-Source Threat Intelligence Aggregation for High-Quality
  Knowledge Graph Representation of Attack Techniques
MultiKG: Multi-Source Threat Intelligence Aggregation for High-Quality Knowledge Graph Representation of Attack Techniques
Jian Wang
Tiantian Zhu
Chunlin Xiong
Yan Chen
24
0
0
13 Nov 2024
Enterprise Use Cases Combining Knowledge Graphs and Natural Language
  Processing
Enterprise Use Cases Combining Knowledge Graphs and Natural Language Processing
Phillip Schneider
Tim Schopf
Juraj Vladika
Florian Matthes
22
1
0
01 Apr 2024
Semantic Ranking for Automated Adversarial Technique Annotation in
  Security Text
Semantic Ranking for Automated Adversarial Technique Annotation in Security Text
Udesh Kumarasinghe
Ahmed Lekssays
H. Sencar
Sabri Boughorbel
Charitha Elvitigala
Preslav Nakov
19
6
0
25 Mar 2024
Using Program Knowledge Graph to Uncover Software Vulnerabilities
Using Program Knowledge Graph to Uncover Software Vulnerabilities
M. Xie
T. Rahat
W. Wang
Y. Tian
9
0
0
08 Dec 2023
Time for aCTIon: Automated Analysis of Cyber Threat Intelligence in the
  Wild
Time for aCTIon: Automated Analysis of Cyber Threat Intelligence in the Wild
G. Siracusano
D. Sanvito
Roberto González
Manikantan Srinivasan
Sivakaman Kamatchi
Wataru Takahashi
Masaru Kawakita
Takahiro Kakumaru
R. Bifulco
17
15
0
14 Jul 2023
Few-Sample Named Entity Recognition for Security Vulnerability Reports
  by Fine-Tuning Pre-Trained Language Models
Few-Sample Named Entity Recognition for Security Vulnerability Reports by Fine-Tuning Pre-Trained Language Models
Guanqun Yang
Shay Dineen
Zhipeng Lin
Xueqing Liu
AAML
6
15
0
14 Aug 2021
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
P. Ranade
Aritran Piplai
Sudip Mittal
A. Joshi
Tim Finin
29
69
0
08 Feb 2021
A System for Efficiently Hunting for Cyber Threats in Computer Systems
  Using Threat Intelligence
A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence
Peng Gao
Fei Shao
Xiaoyuan Liu
Xusheng Xiao
Haoyuan Liu
Zheng Qin
Fengyuan Xu
Prateek Mittal
Sanjeev R. Kulkarni
D. Song
76
14
0
17 Jan 2021
1