ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2411.08359
  4. Cited By
MultiKG: Multi-Source Threat Intelligence Aggregation for High-Quality
  Knowledge Graph Representation of Attack Techniques

MultiKG: Multi-Source Threat Intelligence Aggregation for High-Quality Knowledge Graph Representation of Attack Techniques

13 November 2024
Jian Wang
Tiantian Zhu
Chunlin Xiong
Yan Chen
ArXivPDFHTML

Papers citing "MultiKG: Multi-Source Threat Intelligence Aggregation for High-Quality Knowledge Graph Representation of Attack Techniques"

7 / 7 papers shown
Title
KGV: Integrating Large Language Models with Knowledge Graphs for Cyber
  Threat Intelligence Credibility Assessment
KGV: Integrating Large Language Models with Knowledge Graphs for Cyber Threat Intelligence Credibility Assessment
Zongzong Wu
Fengxiao Tang
Ming Zhao
Yufeng Li
25
1
0
15 Aug 2024
LLMs Perform Poorly at Concept Extraction in Cyber-security Research
  Literature
LLMs Perform Poorly at Concept Extraction in Cyber-security Research Literature
Maxime Wursch
Andrei Kucharavy
Dimitri Percia David
Alain Mermoud
61
5
0
12 Dec 2023
A System for Automated Open-Source Threat Intelligence Gathering and
  Management
A System for Automated Open-Source Threat Intelligence Gathering and Management
Peng Gao
Xiaoyuan Liu
E. Choi
Bhavna Soman
Chinmaya Mishra
K. Farris
D. Song
60
30
0
19 Jan 2021
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
Peng Gao
Fei Shao
Xiaoyuan Liu
Xusheng Xiao
Zheng Qin
Fengyuan Xu
Prateek Mittal
Sanjeev R. Kulkarni
D. Song
47
87
0
26 Oct 2020
Language Models are Few-Shot Learners
Language Models are Few-Shot Learners
Tom B. Brown
Benjamin Mann
Nick Ryder
Melanie Subbiah
Jared Kaplan
...
Christopher Berner
Sam McCandlish
Alec Radford
Ilya Sutskever
Dario Amodei
BDL
721
41,894
0
28 May 2020
POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber
  Threat Hunting
POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting
Sadegh M. Milajerdi
Birhanu Eshete
Rigel Gjomemo
V. Venkatakrishnan
25
206
0
30 Sep 2019
HOLMES: Real-time APT Detection through Correlation of Suspicious
  Information Flows
HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows
Sadegh M. Milajerdi
Rigel Gjomemo
Birhanu Eshete
R. Sekar
V. Venkatakrishnan
42
398
0
03 Oct 2018
1