-
1Academic Journal
المؤلفون: Teuwen, Koen T.W.
المساهمون: He, Jingrui, Palpanas, Themis, Hu, Xiaohua, Cuzzocrea, Alfredo, Dou, Dejing, Slezak, Dominik, Wang, Wei, Gruca, Aleksandra, Lin, Jerry Chun-Wei, Agrawal, Rakesh
المصدر: Teuwen , K T W 2024 , A Modular Approach to Automatic Cyber Threat Attribution using Opinion Pools . in J He , T Palpanas , X Hu , A Cuzzocrea , D Dou , D Slezak , W Wang , A Gruca , J C-W Lin & R Agrawal (eds) , 2023 IEEE International Conference on Big Data, Big Data 2023 . , 10386708 , Institute of Electrical and Electronics Engineers , pp. 3089-3098 , 2023 IEEE International Conference on Big Data , Sorrento , Italy , 15/12/23 . https://doi.org/10.1109/BigData59044.2023.10386708
مصطلحات موضوعية: Cyber Threat Attribution, Modular Architecture, Opinion Pools, Cyber Threat Intelligence, Digital Forensics, /dk/atira/pure/sustainabledevelopmentgoals/peace_justice_and_strong_institutions, name=SDG 16 - Peace, Justice and Strong Institutions
وصف الملف: application/pdf
الاتاحة: https://research.tue.nl/en/publications/3bc29620-af63-4f3c-8f31-62b62cfb1552
https://doi.org/10.1109/BigData59044.2023.10386708
https://pure.tue.nl/ws/files/317713967/A_Modular_Approach_to_Automatic_Cyber_Threat_Attribution_using_Opinion_Pools_v2.pdf
https://pure.tue.nl/ws/files/343582462/A_Modular_Approach_to_Automatic_Cyber_Threat_Attribution_using_Opinion_Pools.pdf
https://arxiv.org/abs/2401.14090
https://github.com/Koen1999/modular-threat-attribution
http://www.scopus.com/inward/record.url?scp=85184977726&partnerID=8YFLogxK -
2
المساهمون: Jahromi, Amir Namavar, Karimipour, Hadis, Dehghantanha, Ali, Choo, Kim-Kwang Raymond
مصطلحات موضوعية: cyber threat detection, Artificial neural network, Computational complexity theory, Computer Networks and Communications, Computer science, Distributed computing, Feature extraction, Decision tree, Cyber-physical system, Industrial control system, Industrial Internet of Things (IIoT), Computer Science Applications, Support vector machine, Pipeline transport, deep representation learning, Hardware and Architecture, Signal Processing, cyber threat attribution, cyber-attacks, cyber–physical systems (CPS), industrial control system (ICS), Information Systems