Login / Signup
Analysis of adversary activities using cloud-based web services to enhance cyber threat intelligence.
Hamad Al-Mohannadi
Irfan Awan
Jassim Al Hamar
Published in:
Serv. Oriented Comput. Appl. (2020)
Keyphrases
</>
web services
loosely coupled
database
artificial intelligence
data analysis
statistical analysis
neural network
information technology
petri net
service discovery