2016
DOI: 10.1007/s00500-016-2265-0
|View full text |Cite
|
Sign up to set email alerts
|

Sec-Buzzer: cyber security emerging topic mining with open threat intelligence retrieval and timeline event annotation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(22 citation statements)
references
References 8 publications
0
22
0
Order By: Relevance
“…traffic [4], unpredicted addresses of packets [5], attributes of requests to databases (DB) [6,7], etc. These articles do not take into account the possibility of parallel formation of reference deviations for the features of anomalies and cyber attacks, which increases the time of RO analysis in ASR (or ISDA) [8].…”
Section: Development Of a System For The Detection Of Cyber Attacks Bmentioning
confidence: 99%
See 2 more Smart Citations
“…traffic [4], unpredicted addresses of packets [5], attributes of requests to databases (DB) [6,7], etc. These articles do not take into account the possibility of parallel formation of reference deviations for the features of anomalies and cyber attacks, which increases the time of RO analysis in ASR (or ISDA) [8].…”
Section: Development Of a System For The Detection Of Cyber Attacks Bmentioning
confidence: 99%
“…We accepted that ct a and ct b are the reference vectors of RO classes, in particular, by the KDD Cup 1999 Data [2,5,7].…”
Section: The Aim and Tasks Of Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…One such work was done by Lee et al with the aim of grouping a set of experts who have highly contributed in the cyber security domain on Twitter and RSS blogs [9]. Their primary research concern was to detect emerging topics on cyber security with the help of automatically uncovering diverse experts as new information providers.…”
Section: Introductionmentioning
confidence: 99%
“…An essential shortcoming of articles [15,16] is the lack of architectural realization of DSS for the tasks of OBCP IS, which are difficult to formalize. As recognized by authors [16], the majority of similar DSS and ES have been at the stage of testing so far.…”
Section: Introductionmentioning
confidence: 99%