Stix 2 ids

semanticscholar(2015)

引用 0|浏览4
暂无评分
摘要
The possibility to run threat intelligence against the IT infrastructure to protect, creates opportunities for protection enhancement as well as threat intelligence sharing group management. We introduce our approach to link STIX formatted data to an infrastructure’s assets.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要