Login / Signup

A heterogeneous graph-based approach for cyber threat attribution using threat intelligence.

Junting DuanYujie LuoZhicheng ZhangJianjian Peng
Published in: ICMLC (2024)
Keyphrases
  • cyber crime
  • countermeasures
  • intelligent systems
  • structured data
  • information systems
  • sir model
  • real world
  • random walk
  • graph matching
  • graph model
  • cyber security