research
∙
11/01/2022
Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI
Public and commercial companies extensively share cyber threat intellige...
research
∙
10/31/2022
SoK: Modeling Explainability in Security Monitoring for Trust, Privacy, and Interpretability
Trust, privacy, and interpretability have emerged as significant concern...
research
∙
04/08/2022
CyNER: A Python Library for Cybersecurity Named Entity Recognition
Open Cyber threat intelligence (OpenCTI) information is available in an ...
research
∙
03/04/2022
Adversarial Patterns: Building Robust Android Malware Classifiers
Deep learning-based classifiers have substantially improved recognition ...
research
∙
02/08/2022