Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1)
  • Open Access

    ARTICLE

    Threat Modeling and Application Research Based on Multi-Source Attack and Defense Knowledge

    Shuqin Zhang, Xinyu Su*, Peiyu Shi, Tianhui Du, Yunfei Han

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 349-377, 2023, DOI:10.32604/cmc.2023.040964

    Abstract Cyber Threat Intelligence (CTI) is a valuable resource for cybersecurity defense, but it also poses challenges due to its multi-source and heterogeneous nature. Security personnel may be unable to use CTI effectively to understand the condition and trend of a cyberattack and respond promptly. To address these challenges, we propose a novel approach that consists of three steps. First, we construct the attack and defense analysis of the cybersecurity ontology (ADACO) model by integrating multiple cybersecurity databases. Second, we develop the threat evolution prediction algorithm (TEPA), which can automatically detect threats at device nodes, correlate and map multi-source threat information,… More >

Displaying 1-10 on page 1 of 1. Per Page