Analyzing evolving trends of vulnerabilities in national vulnerability database. Barranco RC, Dey S. MA Williams, S Dey, RC Barranco… - … Conference on Big …, 2018 - ieeexplore.ieee.org GSID: X91DEcBmtOoJ
Open source vulnerability notification. Carlson B, Leach K, Marinov D, Nagappan M. B Carlson, K Leach, D Marinov, M Nagappan… - … Conference on Open …, 2019 - Springer GSID: kVPFGBjfw4sJ
Security and privacy in smart farming: Challenges and opportunities. Abdelsalam M, Gupta M, Khorsandroo S. M Gupta, M Abdelsalam, S Khorsandroo… - IEEE Access, 2020 - ieeexplore.ieee.org GSID: juQ5PwpF0SUJ
Creating cybersecurity knowledge graphs from malware after action reports. Finin T, Holt J, Joshi A, Mittal S, Piplai A, Zak R. A Piplai, S Mittal, A Joshi, T Finin, J Holt, R Zak - IEEE Access, 2020 - ieeexplore.ieee.org GSID: HW_plIOiIjMJ
Knowledge enrichment by fusing representations for malware threat intelligence and behavior. Abdelsalam M, Mittal S, Piplai A. A Piplai, S Mittal, M Abdelsalam… - … on Intelligence and …, 2020 - ieeexplore.ieee.org GSID: kSdG4Fy6_RUJ