Graph Visualization of Cyber Threat Intelligence Data for Analysis of Cyber Attacks
Öz
Anahtar Kelimeler
Kaynakça
- [1] Y. Bu ̈rhan and R. Das ̧, “Co-author link prediction from academic databases,” Gazi University, Journal of Polytechnic, vol. 20, no. 4, pp. 787–800, Dec. 2017. [Online]. Available: http://dergipark.gov.tr/ download/article- file/387477
- [2] L. Yang, E. Cheng, and Z. M. O ̈zsoyog ̆lu, “Efficient path-based computations on pedigree graphs with compact encodings,” BMC Bioinformatics, vol. 13, no. S3, p. S14, Dec. 2012. [Online]. Available: https://bmcbioinformatics.biomedcentral. com/articles/10.1186/1471- 2105- 13- S3- S14
- [3] Q. Guo, X. Qiu, X. Xue, and Z. Zhang, “Syntax-guided text generation via graph neural network,” Science China Information Sciences, vol. 64, no. 5, p. 152102, May 2021. [Online]. Available: http://link.springer.com/10.1007/s11432-019-2740-1
- [4] B. Xie, C. Qi, H. Ben, and W. Yu, “The applications of graph theory in electric network,” in 2019 International Conference on Sensing, Diagnostics, Prognostics, and Control (SDPC). Beijing, China: IEEE, Aug. 2019, pp. 780–784. [Online]. Available: https: //ieeexplore.ieee.org/document/9168962/
- [5] D. P. Sinha, “A pairing between graphs and trees,” arXiv:math/0502547, Oct. 2006, arXiv: math/0502547. [Online]. Available: http://arxiv.org/ abs/math/0502547
- [6] S. A. M. A. Junid, N. M. Tahir, Z. A. Majid, and M. F. M. Idros, “Potential of graph theory algorithm approach for DNA sequence alignment and comparison,” in 2012 Third International Conference on Intelligent Systems Modelling and Simulation. Kota Kinabalu, Malaysia: IEEE, Feb. 2012, pp. 187–190. [Online]. Available: http://ieeexplore.ieee.org/document/6169697/
- [7] J. Zhao, Q. Yan, J. Li, M. Shao, Z. He, and B. Li, “TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data,” Computers & Security, vol. 95, p. 101867, Aug. 2020. [Online]. Available: https://linkinghub.elsevier.com/ retrieve/pii/S0167404820301395
- [8] OASIS, “STIXTM version 2.0. part 3: Cyber observable core concepts.”
Ayrıntılar
Birincil Dil
İngilizce
Konular
Yazılım Testi, Doğrulama ve Validasyon
Bölüm
Araştırma Makalesi
Yayımlanma Tarihi
30 Temmuz 2022
Gönderilme Tarihi
19 Mart 2022
Kabul Tarihi
28 Temmuz 2022
Yayımlandığı Sayı
Yıl 2022 Cilt: 10 Sayı: 3
Cited By
A key review on graph data science: The power of graphs in scientific studies
Chemometrics and Intelligent Laboratory Systems
https://doi.org/10.1016/j.chemolab.2023.104896A new approach to recognizing the use of attitude markers by authors of academic journal articles
Expert Systems with Applications
https://doi.org/10.1016/j.eswa.2023.120538A novel approach for graph-based real-time anomaly detection from dynamic network data listened by Wireshark
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems
https://doi.org/10.4108/eetinis.v12i2.7616Akademik Verilerin Neo4j Çizge Veritabanı ile Modellenmesi
Fırat Üniversitesi Mühendislik Bilimleri Dergisi
https://doi.org/10.35234/fumbd.1514538A Novel Approach for Cyber Threat Analysis Systems Using BERT Model from Cyber Threat Intelligence Data
Symmetry
https://doi.org/10.3390/sym17040587MSG-VA: multi-scale graph visual analytics for real-time network threat detection
Journal of Umm Al-Qura University for Engineering and Architecture
https://doi.org/10.1007/s43995-025-00284-0