Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j Graph Database of Open Source Intelligence.
Elijah PelofskeLorie M. LiebrockVincent UriasPublished in: CoRR (2023)
Keyphrases
- graph databases
- open source intelligence
- application domains
- graph data
- terrorist networks
- graph mining
- structured data
- subgraph isomorphism
- pattern mining
- graph model
- index structure
- query language
- similarity search
- protein structure
- xml databases
- relational databases
- web pages
- mining algorithm
- regular expressions
- greedy algorithm
- social network analysis
- real life
- data structure