Cyber Intelligence

DarkWeb: Updated: List of Dark Net Markets (Tor & I2P)

https://www.gwern.net/docs/sr/2019-04-22-deepdotweb-dnmlist.htmlarrow-up-right

AI and cybersecurity 新創

https://builtin.com/artificial-intelligence/artificial-intelligence-cybersecurityarrow-up-right

Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media

https://dl.acm.org/doi/pdf/10.1145/3132847.3132866?casa_token=SqFTgIAHEZQAAAAA:XPVgVm_C5iWA126pm082llNV2LPfvsdpFBMmSeGaX3Trjd-tQ4ruIhFflUFPZG6mp2HOjCCim5Iz2garrow-up-right

FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature

https://dl.acm.org/doi/abs/10.1145/2976749.2978304?casa_token=hMc4hhPXKK0AAAAA:hIoWO-Xhn-i6dpc5bE6xxgcVFbp2B1jskbKVSiBH7Ad7BUlwGUnEg-iXdyzkCyY4DKtnb5jJkuvjdAarrow-up-right

Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence

https://dl.acm.org/doi/abs/10.1145/2976749.2978315?casa_token=iaBKMN1H8t4AAAAA:empN7tXGkueSDqkDF-BR2tnMyPPikivsNH8pkFRd-ZUozREYL5feT8hO5w9ovrN2jMNkutdpFHopRwarrow-up-right

https://arxiv.org/pdf/2010.13637.pdfarrow-up-right

An Empirical Study of Android Security Bulletins in Different Vendors

https://dl.acm.org/doi/pdf/10.1145/3366423.3380078?casa_token=S0Khwg71PrUAAAAA:rvTYvbMVPWszd83oYsFFTy2q8rjFcEXpQtLyx1zAdmAAXxhFU3BK3b4eEEaLagSKxmDt50B6fHjvwAarrow-up-right

Towards the Detection of Inconsistencies in Public Security Vulnerability Reports

https://www.usenix.org/system/files/sec19fall_dong_prepub.pdfarrow-up-right

Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues

https://dl.acm.org/doi/pdf/10.1145/3319535.3354239?casa_token=EKuYX_5Z8P0AAAAA:Fu7_7Y0nve5K5Mj3EXLJo6gJ26wAKqAQEf9JFAH0dfQhZ1ZURUZaVDh8mlHPvBo0YaXgbzqqJ4V-kQarrow-up-right

Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis

https://par.nsf.gov/servlets/purl/10172758arrow-up-right

Security OSIF: Toward Automatic Discovery and Analysis of Event Based Cyber Threat Intelligence

https://ieeexplore.ieee.org/abstract/document/8560120arrow-up-right

Poirot: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting

https://dl.acm.org/doi/pdf/10.1145/3319535.3363217?casa_token=JA20fxmLf_4AAAAA:ciAfuSdNtRnKyEeqdjNOuFKOCBTDdCPz1Lzm7NkiP0rmQCk6GhBEdBgraTMQASe14f03gRfn_xis1garrow-up-right

A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources

https://dl.acm.org/doi/pdf/10.1145/3339252.3342112?casa_token=h8bCiu1wZecAAAAA:jjlCpv5twil3KhJ0rDv4PRJ-pMNuwD5MUiFZFzhk2txjMXbBcd98dAYEwYCgB5REewAA9gG-GKt8NQarrow-up-right

Automatic Identification of Indicators of Compromise using Neural-Based Sequence Labelling

https://arxiv.org/pdf/1810.10156.pdfarrow-up-right

iGen: Toward Automatic Generation and Analysis of Indicators of Compromise (IOCs) using Convolutional Neural Network

https://repository.asu.edu/attachments/186547/content/Panwar_asu_0010N_17075.pdfarrow-up-right

ARIZONA STATE UNIVERSITY

(So so) A Supervised Machine Learning Based Approach for Automatically Extracting High-Level Threat Intelligence from Unstructured Sources

https://www.researchgate.net/profile/Muhammad_Tahir63/publication/330477778_A_Supervised_Machine_Learning_Based_Approach_for_Automatically_Extracting_High-Level_Threat_Intelligence_from_Unstructured_Sources/links/5d905792a6fdcc2554a4788a/A-Supervised-Machine-Learning-Based-Approach-for-Automatically-Extracting-High-Level-Threat-Intelligence-from-Unstructured-Sources.pdfarrow-up-right

Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence

https://www.researchgate.net/profile/Ghaith_Husari/publication/329954467_Using_Entropy_and_Mutual_Information_to_Extract_Threat_Actions_from_Cyber_Threat_Intelligence/links/5c2a67eca6fdccfc70742a47/Using-Entropy-and-Mutual-Information-to-Extract-Threat-Actions-from-Cyber-Threat-Intelligence.pdfarrow-up-right

Cyberthreat Detection from Twitter using Deep Neural Networks

https://arxiv.org/pdf/1904.01127.pdfarrow-up-right

Threat Intelligence Computing (CCS2018 IBM)

https://dl.acm.org/doi/pdf/10.1145/3243734.3243829?casa_token=v4kzXgkNoNwAAAAA:P66EiIRVdbBH19Ba_rMzcPFYGps0p-UxcpPo2qJ5DvigqIMaBo-YN-kWZfhNNZlEdEweLutcAjCHTAarrow-up-right

Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions

https://dl.acm.org/doi/pdf/10.1145/3052973.3053017?casa_token=_74abjB--vkAAAAA:K1FF3_QzSFdIJelApGlP3SpctnkM_T7jb6bGK2_y1cyB-HSY2g44-copmbqfvyc2g-MqqDPvbHmJPgarrow-up-right

Understanding the Reproducibility of Crowd-reported Security Vulnerabilities (USENIX18)

https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-mu.pdf

TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources

https://dl.acm.org/doi/pdf/10.1145/3134600.3134646?casa_token=3js61xKJin0AAAAA:Y4yW0gYsnUWfPwZOBHyupEHvDxQ--9rCu6iZQ7AgPdnLtrJp_44doAgQKxYzVZK0mpoP60ATAaBGRQarrow-up-right

https://dl.acm.org/doi/pdf/10.1145/3134600.3134646?casa_token=3js61xKJin0AAAAA:Y4yW0gYsnUWfPwZOBHyupEHvDxQ--9rCu6iZQ7AgPdnLtrJp_44doAgQKxYzVZK0mpoP60ATAaBGRQarrow-up-right

Feature Driven Learning Framework for Cybersecurity Event Detection

https://dl.acm.org/doi/pdf/10.1145/3341161.3342871?casa_token=I93zTic7eyEAAAAA:ls6m3AUWBbTqxGRiqhBci8JuRSvOyyAAmR98qjlhwps1jiI68WvO8ggDx87a1Os4GDwCLMfgBYx0KAarrow-up-right

AITI: An Automatic Identification Model of Threat Intelligence Based on Convolutional Neural Network

https://dl.acm.org/doi/pdf/10.1145/3390557.3394305?casa_token=sy_-ux9vc7QAAAAA:Wr-T7cAJzuv_VASU3v5oP5VuCeVa83Izcztoy9D_kaxh3GRN9gJxRVHsngvb82SeY3GGCDj-aUbnZgarrow-up-right

Automatic Identification of Indicators of Compromise using Neural-Based Sequence Labelling (2018 Tacent)

https://www.aclweb.org/anthology/Y18-1098.pdfarrow-up-right

Cyber Threat Intelligence Modeling Based on Heterogeneous Graph Convolutional Network

https://www.usenix.org/system/files/raid20-zhao.pdfarrow-up-right

Automated Retrieval of ATT&CK Tactics and Techniques for Cyber Threat Reports

https://arxiv.org/pdf/2004.14322.pdfarrow-up-right

OSINT-based Data-driven Cybersecurity Discovery (4 pages)

http://conferences.inf.ed.ac.uk/EuroDW2018/papers/eurodw18-Alves.pdfarrow-up-right

TOWARDS AUTOMATICALLY EVALUATING SECURITY RISKS AND PROVIDING CYBER INTELLIGENCE (thesis)

https://smartech.gatech.edu/bitstream/handle/1853/58679/LIAO-DISSERTATION-2017.pdf?sequence=1&isAllowed=yarrow-up-right

Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC

https://link.springer.com/chapter/10.1007/978-3-030-41579-2_9arrow-up-right

A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams

https://dl.acm.org/doi/pdf/10.1145/3341161.3344379?casa_token=iNeAx_WJdBUAAAAA:Y7Uy5OmbKlEaz97pLtm0PNAeToQMN6frcQe8JNPmeeMfrzcDqtH7lVt4zUMyljtfJN55i9VUkD4qbAarrow-up-right

(***) A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams

https://dl.acm.org/doi/pdf/10.1145/3341161.3344379?casa_token=iNeAx_WJdBUAAAAA:Y7Uy5OmbKlEaz97pLtm0PNAeToQMN6frcQe8JNPmeeMfrzcDqtH7lVt4zUMyljtfJN55i9VUkD4qbAarrow-up-right

EIGER: Automated IOC Generation for Accurate and Interpretable Endpoint Malware Detection

https://dl.acm.org/doi/pdf/10.1145/3359789.3359808?casa_token=B5a06KSGMGgAAAAA:--3a8J59frgZQUYPdp_P6gHZ-2Xbt7VIZH_pkZNYjmFoMz7BLcY9zoN3q07n1fZ1yXirLPgnCus7sQarrow-up-right

PURE: Generating Quality Threat Intelligence by Clustering and Correlating OSINT

https://www.researchgate.net/profile/Iberia_Medeiros/publication/334288293_PURE_Generating_Quality_Threat_Intelligence_by_Clustering_and_Correlating_OSINT/links/5d816ed292851c22d5e08c46/PURE-Generating-Quality-Threat-Intelligence-by-Clustering-and-Correlating-OSINT.pdfarrow-up-right

https://ieeexplore.ieee.org/abstract/document/8472775arrow-up-right

https://ieeexplore.ieee.org/abstract/document/9072563arrow-up-right

Automated Solution for Enrichment and Quality IoC Creation from OSINT

http://disiem-project.eu/wp-content/uploads/2018/11/INForum2018_enr-IoC.pdfarrow-up-right

(***) Reading Thieves’ Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces

https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-yuan_0.pdfarrow-up-right

A Multi-Vocal Review of Security Orchestration

https://dl.acm.org/doi/pdf/10.1145/3305268?casa_token=VEVl0cdpy_AAAAAA:UmTTNO0XqqbVhY40J-l-9C_qAv4XfR90fzbuNrQIQx-38WUNyZeT7fUSO-Sve96CP2neXRoEJsfJFwarrow-up-right

From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence

https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=8960350arrow-up-right

Collecting Indicators of Compromise from Unstructured Text of Cybersecurity Articles using Neural-Based Sequence Labelling

https://arxiv.org/pdf/1907.02636.pdfarrow-up-right

Last updated