An Overview of Cybersecurity Knowledge Graphs Mapped to the MITRE ATT&CK Framework Domains
A large volume of cybersecurity-related data sets are generated daily from systems following
disparate protocols and standards. It is humanly impossible for cybersecurity experts to …
disparate protocols and standards. It is humanly impossible for cybersecurity experts to …
Multiontology construction and application of threat model based on adversarial attack and defense under iso/iec 27032
X Hu, D Cheng, J Chen, X Jin, B Wu - IEEE Access, 2022 - ieeexplore.ieee.org
Research pertaining to threat modeling is significant. However, the existing threat modeling
methods suffer from ambiguity, heterogeneity and incompleteness; furthermore, the threat …
methods suffer from ambiguity, heterogeneity and incompleteness; furthermore, the threat …
[图书][B] Machine Learning for Malicious URL Classification: A Temporal Analysis
EN Wehr - 2024 - search.proquest.com
Abstract When Machine Learning (ML) is applied to labelled datasets, it is standard practice
that 70% of the dataset is used for training models, with 30% used for testing. That approach …
that 70% of the dataset is used for training models, with 30% used for testing. That approach …
A System for the Detection of Adversarial Attacks in Computer Vision via Performance Metrics
S Reynolds - 2023 - commons.erau.edu
Adversarial attacks, or attacks committed by an adversary to hijack a system, are prevalent in
the deep learning tasks of computer vision and are one of the greatest threats to these …
the deep learning tasks of computer vision and are one of the greatest threats to these …
Threat Hunting driven by Cyber Threat Intelligence
A Bolla, F Talentino - 2022 - webthesis.biblio.polito.it
The ever-increasing number of cyber-attacks and cyber-criminal activities necessitates the
implementation of countermeasures to protect both public and private businesses. In Italy …
implementation of countermeasures to protect both public and private businesses. In Italy …