Public and commercial companies extensively share cyber threat intellige...
Open Cyber threat intelligence (OpenCTI) information is available in an
...
We present MalONT2.0 – an ontology for malware threat intelligence
<cit....
Overfitting describes the phenomenon that a machine learning model fits ...
Word embedding is a Natural Language Processing (NLP) technique that
aut...
Infinite Tucker Decomposition (InfTucker) and random function prior mode...