Login / Signup
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence.
Peng Gao
Fei Shao
Xiaoyuan Liu
Xusheng Xiao
Zheng Qin
Fengyuan Xu
Prateek Mittal
Sanjeev R. Kulkarni
Dawn Song
Published in:
CoRR (2020)
Keyphrases
</>
cyber crime
crime investigation
cyber security
lightweight
countermeasures
sir model
identity theft
information processing
computationally expensive
cyber attacks
neural network
computationally efficient
knowledge base
privacy issues
computer vision
artificial intelligence
cyber defense
data sets