The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
TOT(Topics over Time) 모델을 통해 사용자는 시간에 따른 특정 주제의 변화를 인식할 수 있습니다. 제안하는 방법은 보안 블로그 게시물의 분할된 데이터 세트를 일정 기간을 기준으로 중복 기간을 이용하여 TOT에 입력한다. 결과는 사이버 위협 인텔리전스 보고서의 다중 라벨링에 적합한 악성 코드 및 공격 캠페인 이름을 포함하는 주제 추출을 제안합니다.
Ryusei NAGASAWA
Kobe University
Keisuke FURUMOTO
National Institute of Information and Communications Technology
Makoto TAKITA
University of Hyogo
Yoshiaki SHIRAISHI
Kobe University
Takeshi TAKAHASHI
National Institute of Information and Communications Technology
Masami MOHRI
Gifu University
Yasuhiro TAKANO
Kobe University
Masakatu MORII
Kobe University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
부
Ryusei NAGASAWA, Keisuke FURUMOTO, Makoto TAKITA, Yoshiaki SHIRAISHI, Takeshi TAKAHASHI, Masami MOHRI, Yasuhiro TAKANO, Masakatu MORII, "Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time" in IEICE TRANSACTIONS on Information,
vol. E104-D, no. 5, pp. 556-561, May 2021, doi: 10.1587/transinf.2020DAL0002.
Abstract: The Topics over Time (TOT) model allows users to be aware of changes in certain topics over time. The proposed method inputs the divided dataset of security blog posts based on a fixed period using an overlap period to the TOT. The results suggest the extraction of topics that include malware and attack campaign names that are appropriate for the multi-labeling of cyber threat intelligence reports.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.2020DAL0002/_p
부
@ARTICLE{e104-d_5_556,
author={Ryusei NAGASAWA, Keisuke FURUMOTO, Makoto TAKITA, Yoshiaki SHIRAISHI, Takeshi TAKAHASHI, Masami MOHRI, Yasuhiro TAKANO, Masakatu MORII, },
journal={IEICE TRANSACTIONS on Information},
title={Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time},
year={2021},
volume={E104-D},
number={5},
pages={556-561},
abstract={The Topics over Time (TOT) model allows users to be aware of changes in certain topics over time. The proposed method inputs the divided dataset of security blog posts based on a fixed period using an overlap period to the TOT. The results suggest the extraction of topics that include malware and attack campaign names that are appropriate for the multi-labeling of cyber threat intelligence reports.},
keywords={},
doi={10.1587/transinf.2020DAL0002},
ISSN={1745-1361},
month={May},}
부
TY - JOUR
TI - Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time
T2 - IEICE TRANSACTIONS on Information
SP - 556
EP - 561
AU - Ryusei NAGASAWA
AU - Keisuke FURUMOTO
AU - Makoto TAKITA
AU - Yoshiaki SHIRAISHI
AU - Takeshi TAKAHASHI
AU - Masami MOHRI
AU - Yasuhiro TAKANO
AU - Masakatu MORII
PY - 2021
DO - 10.1587/transinf.2020DAL0002
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E104-D
IS - 5
JA - IEICE TRANSACTIONS on Information
Y1 - May 2021
AB - The Topics over Time (TOT) model allows users to be aware of changes in certain topics over time. The proposed method inputs the divided dataset of security blog posts based on a fixed period using an overlap period to the TOT. The results suggest the extraction of topics that include malware and attack campaign names that are appropriate for the multi-labeling of cyber threat intelligence reports.
ER -