An Overview of Cybersecurity Knowledge Graphs Mapped to the MITRE ATT&CK Framework Domains

J Bolton, L Elluri, KP Joshi - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
A large volume of cybersecurity-related data sets are generated daily from systems following
disparate protocols and standards. It is humanly impossible for cybersecurity experts to …

Multiontology construction and application of threat model based on adversarial attack and defense under iso/iec 27032

X Hu, D Cheng, J Chen, X Jin, B Wu - IEEE Access, 2022 - ieeexplore.ieee.org
Research pertaining to threat modeling is significant. However, the existing threat modeling
methods suffer from ambiguity, heterogeneity and incompleteness; furthermore, the threat …

[图书][B] Machine Learning for Malicious URL Classification: A Temporal Analysis

EN Wehr - 2024 - search.proquest.com
Abstract When Machine Learning (ML) is applied to labelled datasets, it is standard practice
that 70% of the dataset is used for training models, with 30% used for testing. That approach …

A System for the Detection of Adversarial Attacks in Computer Vision via Performance Metrics

S Reynolds - 2023 - commons.erau.edu
Adversarial attacks, or attacks committed by an adversary to hijack a system, are prevalent in
the deep learning tasks of computer vision and are one of the greatest threats to these …

Threat Hunting driven by Cyber Threat Intelligence

A Bolla, F Talentino - 2022 - webthesis.biblio.polito.it
The ever-increasing number of cyber-attacks and cyber-criminal activities necessitates the
implementation of countermeasures to protect both public and private businesses. In Italy …