Login / Signup
A Comparison of Vulnerability Feature Extraction Methods from Textual Attack Patterns.
Refat Othman
Bruno Rossi
Barbara Russo
Published in:
CoRR (2024)
Keyphrases
</>
attack graphs
frequent patterns
pattern mining
data mining
attack graph
natural language
keywords
multimedia
data analysis
intrusion detection
database
machine learning
pattern analysis
textual data
countermeasures
dos attacks
human generated
metadata
security vulnerabilities
search engine