SCE17-0185: STIX representation of cyber threat intelligence
In Cybersecurity operation, it is an important task to share Cyber Threat Intelligence (CTI). In order to facilitate CTI sharing, we need to have a flexible representation for these information. To allow organizations to perform automated checking to determine whether the IT environment of the organ...
Main Author: | Phua, Kin Wee |
---|---|
Other Authors: | Lam Kwok Yan |
Format: | Final Year Project (FYP) |
Language: | English |
Published: |
2018
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/75696 |
Similar Items
-
TFIDF meets deep document representation : a re-visit of co-training for text classification
by: Chen, Zhiwei
Published: (2020) -
Personality detection from text, based on the MBTI model
by: Christienne Grace Regodon, Visco
Published: (2020) -
Generalized AutoNLP model for name entity recognition task
by: Wong, Yung Shen
Published: (2022) -
Sentiment analysis on yelp reviews
by: Wong, Hong Yong
Published: (2021) -
Topic extraction and sentiment analysis of a subreddit (r/coronavirus)
by: Chong, You Min
Published: (2021)