-
1
Application of security threat intelligence based on big data analysis in telecom operators
Published 2020-11-01Subjects: “…threat intelligence…”
Get full text
Article -
2
Big data security analysis method based on self-update threat intelligence database
Published 2018-03-01Subjects: Get full text
Article -
3
APT attack threat-hunting network model based on hypergraph Transformer
Published 2024-02-01Subjects: Get full text
Article -
4
Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF
Published 2022-06-01Subjects: “…advanced persistent threat…”
Get full text
Article -
5
Review of threat discovery and forensic analysis based on system provenance graph
Published 2022-07-01Subjects: Get full text
Article -
6
Network security threat warning method based on qualitative differential game
Published 2018-08-01Subjects: “…network security threat…”
Get full text
Article -
7
Network threat situation assessment based on unsupervised multi-source data feature analysis
Published 2020-02-01Subjects: Get full text
Article -
8
Survey of IoT security research: threats, detection and defense
Published 2021-08-01Subjects: Get full text
Article -
9
Research on the Defense of Advanced Persistent Threats in Enterprise Network
Published 2013-12-01Subjects: Get full text
Article -
10
The influence of infantile cues on motivated perception of threats among caregivers
Published 2025-04-01Subjects: “…Threat…”
Get full text
Article -
11
-
12
Do relationships with parents determine citizens’ reactions to war trauma?
Published 2024-02-01Subjects: Get full text
Article -
13
The butterfly (Lepidoptera: Papilionoidea) diversity of Mt. Mosor in Dalmatia, Croatia
Published 2020-12-01Subjects: Get full text
Article -
14
First confirmation of variegated molehopper Xya variegata (Latreille, 1809) (Orthoptera: Tridactylidae) occuring in Slovenia
Published 2023-11-01Subjects: Get full text
Article -
15
Virtual Violence and New Media Ethics: The Boundary between Legitimate and Harmful Expressions
Published 2024-12-01Subjects: “…virtual violence, new media ethics, expression and threat.…”
Get full text
Article -
16
Enhancing Industrial Cybersecurity: Insights From Analyzing Threat Groups and Strategies in Operational Technology Environments
Published 2025-01-01Subjects: Get full text
Article -
17
Literature Review of Machine Learning and Threat Intelligence in Cloud Security
Published 2025-01-01Subjects: Get full text
Article -
18
The Power of Perspective. Discrimination Against Men
Published 2021-04-01Subjects: Get full text
Article -
19
Cupido osiris (Lepidoptera, Rhopalocera): an overlooked species of the Slovenian butterfly fauna
Published 2011-12-01Subjects: Get full text
Article -
20