Attack Tactic Labeling for Cyber Threat Hunting.
Sheng-Xiang LinZong-Jyun LiTzu-Yang ChenDong-Jie WuPublished in: ICACT (2022)
Keyphrases
- cyber crime
- countermeasures
- cyber attacks
- cyber security
- active learning
- cyber defense
- power analysis
- cyber physical
- supplier selection
- image segmentation
- information security
- labeling process
- image labeling
- identity theft
- malicious attacks
- denial of service attacks
- data sets
- intrusion detection
- detection mechanism
- security policies
- web pages
- malicious users
- social networks
- neural network