Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security 2019
DOI: 10.1145/3314058.3318167
|View full text |Cite
|
Sign up to set email alerts
|

ThreatZoom

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…From the manuscript no. Table 1 Results of radiocarbon analysis: measured F 14 C and corresponding 14 C age, δ 13 C measured by AMS on graphite sample, all samples contained ca. 1 mg of carbon.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…From the manuscript no. Table 1 Results of radiocarbon analysis: measured F 14 C and corresponding 14 C age, δ 13 C measured by AMS on graphite sample, all samples contained ca. 1 mg of carbon.…”
Section: Discussionmentioning
confidence: 99%
“…Thus, the following results offer perspectives on documents mainly from the second millennium. Since the dating of some documents has been subject of discussions and disputes, the results of 14 C presented here can help enhance our understanding of their history. We also hope that results of our campaign will give an incentive to apply scientific dating to other philological fields on the one hand, and to attract the attention of scholars in physics to the potential that these measurements have for the improvement of the technique as well as its application on philology on the other hand.…”
Section: Introductionmentioning
confidence: 95%
See 2 more Smart Citations
“…Legoy[101] evaluated different multi-label text classification models to retrieve TTPs from textual sources based on the ATT&CK framework and developed a tool for extracting ATT&CK Tactics and Techniques from cyber threat reports to a structured format. Aghaei et al[102] suggested using machine learning, deep learning, and natural language processing to map CVE to CAPEC and ATT&CK automatically and found the appropriate mitigation for each CVE. By mapping the MITRE ATT&CK Matrix to the NIST cyber security framework, Kwon et al[103] offered approaches and practical solutions to cyber threats.…”
mentioning
confidence: 99%