Y Hu,
F Zou, J Han, X Sun, Y Wang - Computers & Security, 2024 - Elsevier
Open-source threat intelligence is often unstructured and cannot be directly applied to the
next detection and defense. By constructing a knowledge graph through open-source threat …