Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence

作者: Xiaojing Liao , Kan Yuan , XiaoFeng Wang , Zhou Li , Luyi Xing

DOI: 10.1145/2976749.2978315

关键词:

摘要: To adapt to the rapidly evolving landscape of cyber threats, security professionals are … of such open-source threat intelligence on security protection and evolution of attack strategies. …

参考文章(22)
Tao Xie, Rahul Pandita, William Enck, Xusheng Xiao, Wei Yang, WHYPER: towards automating risk assessment of mobile applications usenix security symposium. pp. 527- 542 ,(2013)
Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, Guofei Jiang, None, SUPOR: precise and scalable sensitive user input detection for android apps usenix security symposium. pp. 977- 992 ,(2015)
Guofei Gu, Zhemin Yang, Yuhong Nan, Shunfan Zhou, Min Yang, XiaoFeng Wang, UIPicker: user-input privacy identification in mobile applications usenix security symposium. pp. 993- 1008 ,(2015)
Rada Mihalcea, Paul Tarau, TextRank: Bringing Order into Text empirical methods in natural language processing. pp. 404- 411 ,(2004)
Diane J Cook, Lawrence B Holder, None, Mining Graph Data : Wiley-Interscience,. ,(2006)
Tudor Dumitras, Carl Sabottke, Octavian Suciu, Vulnerability disclosure in the age of social media: exploiting twitter for predicting real-world exploits usenix security symposium. pp. 1041- 1056 ,(2015)
Thomas Gärtner, Peter Flach, Stefan Wrobel, On Graph Kernels: Hardness Results and Efficient Alternatives Learning Theory and Kernel Machines. pp. 129- 143 ,(2003) , 10.1007/978-3-540-45167-9_11
Lan Yi, Bing Liu, Xiaoli Li, None, Eliminating noisy information in Web pages for data mining knowledge discovery and data mining. pp. 296- 305 ,(2003) , 10.1145/956750.956785
Zhengyang Qu, Vaibhav Rastogi, Xinyi Zhang, Yan Chen, Tiantian Zhu, Zhong Chen, AutoCog: Measuring the Description-to-permission Fidelity in Android Applications computer and communications security. pp. 1354- 1365 ,(2014) , 10.1145/2660267.2660287
David Nadeau, Satoshi Sekine, A survey of named entity recognition and classification Lingvisticae Investigationes. ,vol. 30, pp. 3- 26 ,(2007) , 10.1075/LI.30.1.03NAD