[1] |
PADIA A, KALPAKIS K, FERRARO F, et al. Knowledge Graph Fact Prediction via Knowledge-Enriched Tensor Factorization[J]. Journal of Web Semantics, 2019, 59:100497.
doi: 10.1016/j.websem.2019.01.004
|
[2] |
GONG S, LEE C. Blocis:Blockchain-Based Cyber Threat Intelligence Sharing Framework for Sybil-Resistance[J]. Electronics, 2020, 9(3):521.
doi: 10.3390/electronics9030521
|
[3] |
PUROHIT S, CALYAM P, WANG S, et al. Defensechain:Consortium Blockchain for Cyber Threat Intelligence Sharing and Defense[C]// 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS).Piscataway:IEEE, 2020:112-119.
|
[4] |
TRAN H N, TAKASU A. Analyzing Knowledge Graph Embedding Methods from a Multi-Embedding Interaction Perspective (2019)[J/OL].[2019-03-27]. https://arxiv.org/abs/1903.11406v2.
|
[5] |
何志鹏, 刘鹏, 王鹤. 网络威胁情报标准化建设分析[J]. 信息安全研究, 2021, 7(6):503-511.
|
|
HE Zhipeng, LIU Peng, WANG He. Analysis of the Standardization Construction of Network Threat Intelligence[J]. Information Security Research, 2021, 7(6):503-511.
|
[6] |
孙铭鸿, 蔡蓓蓓. 基于情报、威胁框架等方式追踪溯源方法研究[J]. 江苏通信, 2022, 38(3):109-112.
|
|
SUN Minghong, CAI Beibei. Research on Traceability Methods Based on Intelligence,Threat Framework,and Other Methods[J]. Jiangsu Communication, 2022, 38(3):109-112.
|
[7] |
徐留杰, 翟江涛, 杨康, 等. 一种多源网络安全威胁情报采集与封装技术[J]. 网络安全技术与应用, 2018, 214(10):26-29.
|
|
XU Liujie, ZHAI Jiangtao, YANG Kang, et al. A Multi-Source Network Security Threat Intelligence Collection and Packaging Technology[J]. Network Security Technology and Application, 2018, 214(10):26-29.
|
[8] |
HUANG Z, WEI X, KAI Y. Bidirectional LSTM-CRF Models for Sequence Tagging (2015)[J/OL].[2015-08-09]. https://arxiv.org/abs/1508.01991.
|
[9] |
LONG Z, TAN L, ZHOU S, et al. Collecting Indicators of Compromise from Unstructured Text of Cybersecurity Articles Using Neural-Based Sequence Labelling[C]// 2019 International Joint Conference on Neural Networks (IJCNN).Piscataway:IEEE, 2019:1-8.
|
[10] |
LAMPLE G, BALLESTEROS M, SUBRAMANIAN S, et al. Neural Architectures for Named Entity Recognition(2016)[C/OL].[2016-03-04]. https://arxiv.org/abs/1603.01360v1.
|
[11] |
LANDAUER M, SKOPIK F, WURZENBERGER M, et al. A Framework for Cyber Threat Intelligence Extraction from Raw Log Data[C]// 2019 IEEE International Conference on Big Data (Big Data).Piscataway:IEEE, 2019:3200-3209.
|
[12] |
KUROGOME Y, OTSUKI Y, KAWAKOYA Y, et al. EIGER:Automated IOC Generation for Accurate and Interpretable Endpoint Malware Detection[C]// Proceedings of the 35th Annual Computer Security Applications Conference. New York: ACM, 2019:687-701.
|
[13] |
胡代旺, 焦一源, 李雁妮. 一种新型高效的文库知识图谱实体关系抽取算法[J]. 西安电子科技大学学报, 2021, 48(6):75-83.
|
|
HU Daiwang, JIAO Yiyuan, LI Yanni. A Novel and Efficient Algorithm for Extracting Entity Relationships from Library Knowledge Graph[J]. Journal of Xidian University, 2021, 48(6):75-83.
|
[14] |
郭渊博, 李勇飞, 陈庆礼, 等. 融合Focal Loss的网络威胁情报实体抽取[J]. 通信学报, 2022, 43(7):85-92.
doi: 10.11959/j.issn.1000-436x.2022132
|
|
GUO Yuanbo, LI Yongfei, CHEN Qingli, et al. Fusion of Focal Loss for Network Threat Intelligence Entity Extraction[J]. Journal of Communications, 2022, 43(7):85-92.
doi: 10.11959/j.issn.1000-436x.2022132
|
[15] |
程顺航, 李志华, 魏涛. 融合自举与语义角色标注的威胁情报实体关系抽取方法[J]. 计算机应用, 2023, 43(5):1445-1453.
doi: 10.11772/j.issn.1001-9081.2022040551
|
|
CHENG Shunhang, LI Zhihua, WEI Tao. A Threat Intelligence Entity Relationship Extraction Method Combining Bootstrap and Semantic Role Annotation[J]. Computer Applications, 2023, 43(5):1445-1453.
doi: 10.11772/j.issn.1001-9081.2022040551
|
[16] |
石波, 于然, 朱健. 基于知识图谱的网络空间安全威胁感知技术研究[J]. 信息安全研究, 2022, 8(8):845-853.
|
|
SHI Bo, YU Ran, ZHU Jian. Research on Threat Perception Technology for Cyberspace Security Based on Knowledge Graph[J]. Information Security Research, 2022, 8(8):845-853.
|
[17] |
董聪, 姜波, 卢志刚, 等. 面向网络空间安全情报的知识图谱综述[J]. 信息安全学报, 2020, 5(5):56-76.
doi: 10.4236/jis.2014.52006
|
|
DONG Cong, JIANG Bo, LU Zhigang, et al. A Survey of Knowledge Map for Cyberspace Security Intelligence[J]. Journal of Information Security, 2020, 5(5):56-76.
doi: 10.4236/jis.2014.52006
|
[18] |
WU S, ZHANG Y, CAO W. Network Security Assessment Using a Semantic Reasoning and Graph Based Approach[J]. Computers & Electrical Engineering, 2017, 64:96-109.
|
[19] |
刘强, 祝鹏程. 基于联合学习的端到端威胁情报知识图谱构建方法[J]. 现代计算机, 2021, 16:16-21.
|
|
LIU Qiang, ZHU Pengcheng. A Method for Constructing an End-to-End Threat Intelligence Knowledge Graph Based on Joint Learning[J]. Modern Computer Science, 2021, 16:16-21.
|
[20] |
GONG N Z, LIU B. You are Who You Know and How You Behave:Attribute Inference Attacks via Users' Social Friends and Behaviors[C]// Proceedings of the 25th USENIX Conference on Security Symposium. New York: ACM, 2016:979-995.
|
[21] |
GASCON H, GROBAUER B, SCHRECK T, et al. Mining Attributed Graphs for Threat Intelligence[C]// ACM on Conference on Data Application Security Privacy. New York: ACM, 2017:15-22.
|
[22] |
XU X, CHANG L, QIAN F, et al. Neural Network-Based Graph Embedding for Cross-Platform Binary Code Similarity Detection[C]// Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2017:363-376.
|
[23] |
ZHANG K, LIU J. Review on the Application of Knowledge Graph in Cyber Security Assessment[J]. IOP Conference Series:Materials Science and Engineering, 2020, 768(5):052103.
doi: 10.1088/1757-899X/768/5/052103
|
[24] |
LIU L, TSAI W T, BHUIYAN M Z A, et al. Automatic Blockchain Whitepapers Analysis via Heterogeneous Graph Neural Network[J]. Journal of Parallel and Distributed Computing, 2020, 145:1-12.
doi: 10.1016/j.jpdc.2020.05.014
|
[25] |
OUYANG S, DONG D, XU Y, et al. Communication Optimization Strategies for Distributed Deep Neural Network Training:A Survey[J]. Journal of Parallel and Distributed Computing, 2021, 149:52-65.
doi: 10.1016/j.jpdc.2020.11.005
|
[26] |
MAVROEIDIS V, BROMANDER S. Cyber Threat Intelligence Model:An Evaluation of Taxonomies,Sharing Standards,and Ontologies within Cyber Threat Intelligence[C]// 2017 European Intelligence and Security Informatics Conference (EISIC).Piscataway:IEEE, 2017:91-98.
|
[27] |
MOUBARAK J, BASSIL C, ANTOUN J. On the Dissemination of Cyber Threat Intelligence Through Hyperledger[C]// 2021 17th International Conference on the Design of Reliable Communication Networks (DRCN).Piscataway:IEEE, 2021:1-6.
|
[28] |
崔琳, 杨黎斌, 何清林, 等. 基于开源信息平台的威胁情报挖掘综述[J]. 信息安全学报, 2022, 7(1):1-26.
doi: 10.4236/jis.2016.71001
|
|
CUI Lin, YANG Libin, HE Qinglin, et al. A Review of Threat Intelligence Mining Based on Open Source Information Platform[J]. Journal of Information Security, 2022, 7(1):1-26.
doi: 10.4236/jis.2016.71001
|
[29] |
左开中, 刘蕊, 赵俊, 等. 融合语义信息的时空关联位置隐私保护方法[J]. 西安电子科技大学学报, 2022, 49(1):67-77.
|
|
ZUO Kaizhong, LIU Rui, ZHAO Jun, et al. Method for the Protection of Spatiotemporal Correlation Location Privacy with Semantic Information[J]. Journal of XidIan University, 2022, 49(1):67-77.
|