- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources4
- Resource Type
-
02000020000
- More
- Availability
-
40
- Author / Contributor
- Filter by Author / Creator
-
-
Mitra, Shaswata (4)
-
Mittal, Sudip (4)
-
Chakraborty, Trisha (2)
-
Young, Maxwell (2)
-
Chen, Jingdao (1)
-
Fernandez, Ivan A. (1)
-
Joshi, Anupam (1)
-
Neupane, Subash (1)
-
Pillai, Nisha (1)
-
Piplai, Aritran (1)
-
Rahimi, Shahram (1)
-
Saha, Swayamjit (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
& Abreu-Ramos, E. D. (0)
-
& Adams, S.G. (0)
-
& Ahmed, K. (0)
-
& Ahmed, Khadija. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Chakraborty, Trisha ; Mitra, Shaswata ; Mittal, Sudip ; Young, Maxwell ( , 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN))
-
Mitra, Shaswata ; Piplai, Aritran ; Mittal, Sudip ; Joshi, Anupam ( , 2021 IEEE International Conference on Big Data (Big Data))Today there is a significant amount of fake cybersecurity related intelligence on the internet. To filter out such information, we build a system to capture the provenance information and represent it along with the captured Cyber Threat Intelligence (CTI). In the cybersecurity domain, such CTI is stored in Cybersecurity Knowledge Graphs (CKG). We enhance the exiting CKG model to incorporate intelligence provenance and fuse provenance graphs with CKG. This process includes modifying traditional approaches to entity and relation extraction. CTI data is considered vital in securing our cyberspace. Knowledge graphs containing CTI information along with its provenance can provide expertise to dependent Artificial Intelligence (AI) systems and human analysts.more » « less
-
Neupane, Subash ; Mitra, Shaswata ; Fernandez, Ivan A. ; Saha, Swayamjit ; Mittal, Sudip ; Chen, Jingdao ; Pillai, Nisha ; Rahimi, Shahram ( , IEEE Access)