Cyber Intelligence
DarkWeb: Updated: List of Dark Net Markets (Tor & I2P)
https://www.gwern.net/docs/sr/2019-04-22-deepdotweb-dnmlist.html
AI and cybersecurity 新創
https://builtin.com/artificial-intelligence/artificial-intelligence-cybersecurity
Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media
FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence
https://arxiv.org/pdf/2010.13637.pdf
An Empirical Study of Android Security Bulletins in Different Vendors
Towards the Detection of Inconsistencies in Public Security Vulnerability Reports
https://www.usenix.org/system/files/sec19fall_dong_prepub.pdf
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues
Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis
https://par.nsf.gov/servlets/purl/10172758
Security OSIF: Toward Automatic Discovery and Analysis of Event Based Cyber Threat Intelligence
https://ieeexplore.ieee.org/abstract/document/8560120
Poirot: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting
A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources
Automatic Identification of Indicators of Compromise using Neural-Based Sequence Labelling
https://arxiv.org/pdf/1810.10156.pdf
iGen: Toward Automatic Generation and Analysis of Indicators of Compromise (IOCs) using Convolutional Neural Network
https://repository.asu.edu/attachments/186547/content/Panwar_asu_0010N_17075.pdf
ARIZONA STATE UNIVERSITY
(So so) A Supervised Machine Learning Based Approach for Automatically Extracting High-Level Threat Intelligence from Unstructured Sources
Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence
Cyberthreat Detection from Twitter using Deep Neural Networks
https://arxiv.org/pdf/1904.01127.pdf
Threat Intelligence Computing (CCS2018 IBM)
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities (USENIX18)
https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-mu.pdf
TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources
Feature Driven Learning Framework for Cybersecurity Event Detection
AITI: An Automatic Identification Model of Threat Intelligence Based on Convolutional Neural Network
Automatic Identification of Indicators of Compromise using Neural-Based Sequence Labelling (2018 Tacent)
https://www.aclweb.org/anthology/Y18-1098.pdf
Cyber Threat Intelligence Modeling Based on Heterogeneous Graph Convolutional Network
https://www.usenix.org/system/files/raid20-zhao.pdf
Automated Retrieval of ATT&CK Tactics and Techniques for Cyber Threat Reports
https://arxiv.org/pdf/2004.14322.pdf
OSINT-based Data-driven Cybersecurity Discovery (4 pages)
http://conferences.inf.ed.ac.uk/EuroDW2018/papers/eurodw18-Alves.pdf
TOWARDS AUTOMATICALLY EVALUATING SECURITY RISKS AND PROVIDING CYBER INTELLIGENCE (thesis)
Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC
https://link.springer.com/chapter/10.1007/978-3-030-41579-2_9
A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams
(***) A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams
EIGER: Automated IOC Generation for Accurate and Interpretable Endpoint Malware Detection
PURE: Generating Quality Threat Intelligence by Clustering and Correlating OSINT
https://ieeexplore.ieee.org/abstract/document/8472775
https://ieeexplore.ieee.org/abstract/document/9072563
Automated Solution for Enrichment and Quality IoC Creation from OSINT
http://disiem-project.eu/wp-content/uploads/2018/11/INForum2018_enr-IoC.pdf
(***) Reading Thieves’ Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces
https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-yuan_0.pdf
A Multi-Vocal Review of Security Orchestration
From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence
https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=8960350
Collecting Indicators of Compromise from Unstructured Text of Cybersecurity Articles using Neural-Based Sequence Labelling
Last updated