Results 231 to 240 of about 552,762 (243)
Some of the next articles are maybe not open access.
Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence
Journal of Management Information Systems, 2017Sagar Samtani
exaly
Data-driven analytics for cyber-threat intelligence and information sharing
Computers and Security, 2017Sara Qamar, Zahid Anwar, Mohammad Rahman
exaly
Research of Threat Intelligence Architecture Based on Internal Threat Intelligence
Proceedings of the 2025 4th International Conference on Intelligent Systems, Communications and Computer NetworksFan Jiang, Fucun Zhang, Hao Hong
openaire +1 more source
LLM-TIKG: Threat intelligence knowledge graph construction utilizing large language model
Computers and SecurityYuelin Hu, futai
exaly

