Attack Behavior Extraction Based on Heterogeneous Threat Intelligence Graphs and Data Augmentation
IJCNN(2024)
Key words
threat intelligence,attack behavior extraction,heterogeneous threat intelligence graph,data augmentation,graph attention network
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined