Cited By
View all- Abdeen BAl-Shaer ESinghal AKhan LHamlen K(2024)SMET: Semantic mapping of CTI reports and CVE to ATT&CK for advanced threat intelligenceJournal of Computer Security10.3233/JCS-230218(1-20)Online publication date: 28-Jun-2024
- Kahlhofer MRass S(2024)Application Layer Cyber Deception Without Developer Interaction2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW61312.2024.00053(416-429)Online publication date: 8-Jul-2024
- Qin XJiang FDong CDoss R(2024)A hybrid cyber defense framework for reconnaissance attack in industrial control systemsComputers and Security10.1016/j.cose.2023.103506136:COnline publication date: 1-Feb-2024
- Show More Cited By