2023
DOI: 10.1109/tii.2022.3192027
|View full text |Cite
|
Sign up to set email alerts
|

Knowledge-Driven Cybersecurity Intelligence: Software Vulnerability Coexploitation Behavior Discovery

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
5

Relationship

1
9

Authors

Journals

citations
Cited by 56 publications
(23 citation statements)
references
References 20 publications
0
23
0
Order By: Relevance
“…In addition, the simulation environment is the simulator in the Ubuntu operating system. By simulating the characteristics of the object, we can find that the system can use its special performance to solve the encryption problem at runtime [20][21][22][23][24][25][26][27][28][29]. The simulation parameters of the simulator are set as shown in Table 1.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
“…In addition, the simulation environment is the simulator in the Ubuntu operating system. By simulating the characteristics of the object, we can find that the system can use its special performance to solve the encryption problem at runtime [20][21][22][23][24][25][26][27][28][29]. The simulation parameters of the simulator are set as shown in Table 1.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
“…Finally, 55 submissions were selected as full papers (with an acceptance rate of 24% approximately), plus 29 as short papers. The research papers cover the areas of social network data analysis, recommender systems [1], topic modeling [2], data diversity, data similarity, context-aware recommendation, prediction [3,4], big data processing [5], cloud computing, event detection [6], data mining [7], sentiment analysis, ranking in social networks, microblog data analysis, query processing [8], spatial and temporal data, graph theory and non-traditional environments [9,10]. We are honored to have several of the world's leading experts in the field join us as distinguished keynote speakers and invited speakers.…”
Section: Wise2021mentioning
confidence: 99%
“…The third step entails using Web3 JS and Smart Contracts to develop a graphical interface for the IPFS bandwidth analysis for network file storage. Yin et al [28] introduced a Modality-Aware Graph Convolutional Network (MAGCN) module that integrates topological graph connectivity data and multimodality entity properties into a single lower-dimensional feature space in order to improve link prediction performance. A Graph Knowledge Transfer Learning (GKTL) strategy is also designed using this method to transfer knowledge between subgraphs taken from the same knowledge graph.…”
Section: Related Workmentioning
confidence: 99%