Cited By
View all- Li ZYu XZhao Y(2024)A Web Semantic Mining Method for Fake Cybersecurity Threat Intelligence in Open Source CommunitiesInternational Journal on Semantic Web and Information Systems10.4018/IJSWIS.35009520:1(1-22)Online publication date: 8-Aug-2024
- Settanni FZamponi ABasile C(2024)Dynamic Security Provisioning for Cloud-Native Networks: An Intent-Based Approach2024 IEEE International Conference on Cyber Security and Resilience (CSR)10.1109/CSR61664.2024.10679397(321-328)Online publication date: 2-Sep-2024
- Ling CLiu BXia WHe SJiang ZWang Q(2024)Automated Anti-malware Detection Rules Converter Based on SIMIOC2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD)10.1109/CSCWD61410.2024.10580029(1770-1775)Online publication date: 8-May-2024
- Show More Cited By