Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2211.01753
Cited By
v1
v2 (latest)
Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI
1 November 2022
Md Tanvirul Alam
Dipkamal Bhusal
Youngja Park
Nidhi Rastogi
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI"
19 / 19 papers shown
Title
From IOCs to Group Profiles: On the Specificity of Threat Group Behaviors in CTI Knowledge Bases
Aakanksha Saha
Martina Lindorfer
Juan Caballero
105
0
0
12 Jun 2025
IRCopilot: Automated Incident Response with Large Language Models
Xihuan Lin
Jie Zhang
Gelei Deng
Tianzhe Liu
Xiaolong Liu
Changcai Yang
Tianwei Zhang
Qing Guo
Riqing Chen
34
0
0
27 May 2025
From Texts to Shields: Convergence of Large Language Models and Cybersecurity
Tao Li
Ya-Ting Yang
Yunian Pan
Quanyan Zhu
134
0
0
01 May 2025
CTI-HAL: A Human-Annotated Dataset for Cyber Threat Intelligence Analysis
Sofia Della Penna
R. Natella
Vittorio Orbinato
Lorenzo Parracino
Luciano Pianese
34
0
0
08 Apr 2025
Large Language Models are Unreliable for Cyber Threat Intelligence
Emanuele Mezzi
Fabio Massacci
Katja Tuma
107
2
0
29 Mar 2025
AttackSeqBench: Benchmarking Large Language Models' Understanding of Sequential Patterns in Cyber Attacks
Javier Yong
Haokai Ma
Yunshan Ma
Anis Yusof
Zhenkai Liang
E. Chang
97
0
0
05 Mar 2025
Rule-ATT&CK Mapper (RAM): Mapping SIEM Rules to TTPs Using LLMs
Prasanna N. Wudali
Moshe Kravchik
Ehud Malul
Parth A. Gandhi
Yuval Elovici
A. Shabtai
95
0
0
04 Feb 2025
Cyber-Attack Technique Classification Using Two-Stage Trained Large Language Models
Weiqiu You
Youngja Park
86
0
0
27 Nov 2024
AI-Driven Cyber Threat Intelligence Automation
Shrit Shah
Fatemeh Khoda Parast
16
0
0
26 Oct 2024
CRUcialG: Reconstruct Integrated Attack Scenario Graphs by Cyber Threat Intelligence Reports
Wenrui Cheng
Tiantian Zhu
Tieming Chen
Qixuan Yuan
J. Ying
Hongmei Li
Chunlin Xiong
Mingda Li
Mingqi Lv
Yan Chen
51
1
0
15 Oct 2024
Chasing the Shadows: TTPs in Action to Attribute Advanced Persistent Threats
Nanda Rani
Bikash Saha
Vikas Maurya
Sandeep Kumar Shukla
47
2
0
24 Sep 2024
From Sands to Mansions: Towards Automated Cyberattack Emulation with Classical Planning and Large Language Models
Lingzhi Wang
Zhenyuan Li
Zonghan Guo
Yi Jiang
Kyle Jung
Kedar Thiagarajan
Jiahui Wang
Zhengkai Wang
Emily Wei
Xiangmin Shen
111
0
0
24 Jul 2024
LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI
Yuval Schwartz
Lavi Benshimol
D. Mimran
Yuval Elovici
A. Shabtai
32
5
0
06 Jul 2024
Actionable Cyber Threat Intelligence using Knowledge Graphs and Large Language Models
Romy Fieblinger
Md Tanvirul Alam
Nidhi Rastogi
93
11
0
30 Jun 2024
Semantic Ranking for Automated Adversarial Technique Annotation in Security Text
Udesh Kumarasinghe
Ahmed Lekssays
Husrev Taha Sencar
Sabri Boughorbel
Charitha Elvitigala
Preslav Nakov
102
7
0
25 Mar 2024
TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports
Nanda Rani
Bikash Saha
Vikas Maurya
Sandeep K. Shukla
59
13
0
05 Mar 2024
Crimson: Empowering Strategic Reasoning in Cybersecurity through Large Language Models
Jiandong Jin
Bowen Tang
Mingxuan Ma
Xiao Liu
Yunfei Wang
Qingnan Lai
Jia Yang
Changling Zhou
74
6
0
01 Mar 2024
MORPH: Towards Automated Concept Drift Adaptation for Malware Detection
Md Tanvirul Alam
Romy Fieblinger
Ashim Mahara
Nidhi Rastogi
43
3
0
23 Jan 2024
Time for aCTIon: Automated Analysis of Cyber Threat Intelligence in the Wild
G. Siracusano
D. Sanvito
Roberto González
Manikantan Srinivasan
Sivakaman Kamatchi
Wataru Takahashi
Masaru Kawakita
Takahiro Kakumaru
R. Bifulco
92
16
0
14 Jul 2023
1