2018 IEEE International Conference on Big Data (Big Data) 2018
DOI: 10.1109/bigdata.2018.8622111
|View full text |Cite
|
Sign up to set email alerts
|

Graph Mining-based Trust Evaluation Mechanism with Multidimensional Features for Large-scale Heterogeneous Threat Intelligence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Using threat intelligence platforms, companies can improve their countermeasures against cyber-attacks and prepare detection and prevention mechanisms. In recent years, the cybersecurity communities have emphasized building common threat intelligence platforms to share threat information in a unified and structured way, and make CTI actionable [18,22,31,33,46,52]. Various specifications and protocols such as STIX, TAXII, Cybox, CWE, CAPEC and CVE are widely used to describe and share threat information through common platforms [5,6,12,37].…”
Section: Source Descriptionmentioning
confidence: 99%
“…Using threat intelligence platforms, companies can improve their countermeasures against cyber-attacks and prepare detection and prevention mechanisms. In recent years, the cybersecurity communities have emphasized building common threat intelligence platforms to share threat information in a unified and structured way, and make CTI actionable [18,22,31,33,46,52]. Various specifications and protocols such as STIX, TAXII, Cybox, CWE, CAPEC and CVE are widely used to describe and share threat information through common platforms [5,6,12,37].…”
Section: Source Descriptionmentioning
confidence: 99%
“…Graph is a core component for many important applications ranging from recommendations and customer type analysis in social networks to anomaly detection, behavior analysis in sensor networks [31] [6]. Even if graph is not explicitly given, estimated latent graph can be helpful for those applications because the graph gives them relationships and interactions between nodes [9] [26] [13].…”
Section: Introductionmentioning
confidence: 99%