Login / Signup

From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts.

Md Rayhanur RahmanLaurie A. Williams
Published in: CoRR (2022)
Keyphrases
  • preprocessing
  • significant improvement
  • benchmark datasets
  • database
  • computer vision
  • reinforcement learning
  • statistical analysis
  • real time
  • information systems
  • keywords
  • information processing
  • continuous variables