Login / Signup
A heterogeneous graph-based approach for cyber threat attribution using threat intelligence.
Junting Duan
Yujie Luo
Zhicheng Zhang
Jianjian Peng
Published in:
ICMLC (2024)
Keyphrases
</>
cyber crime
countermeasures
intelligent systems
structured data
information systems
sir model
real world
random walk
graph matching
graph model
cyber security