Attack scenario reconstruction via fusing heterogeneous threat intelligence.
Xiaodong ZangJian GongXinchang ZhangGuiqing LiPublished in: Comput. Secur. (2023)
Keyphrases
- countermeasures
- image reconstruction
- shape recovery
- intelligent systems
- real world
- artificial intelligence
- compressed sensing
- three dimensional
- information processing
- discrete tomography
- reconstruction method
- malicious users
- reconstruction process
- collective intelligence
- compressive sensing
- secret key
- heterogeneous networks
- fusion method
- key exchange protocol