Research and application exploration of threat intelligence system of telecom operators
With the increasing inequality of network attack and defense in the Internet era, threat intelligence has become one of the important tools to narrow this gap.Based on the analysis of the research status of threat intelligence at home and abroad, a set of construction methods of threat intelligence...
Saved in:
Main Authors: | Haitao ZHANG, Yi JIANG, Shijie ZHU, Qi CHEN |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2022-12-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2022293/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Application of security threat intelligence based on big data analysis in telecom operators
by: Mingxia BO, et al.
Published: (2020-11-01) -
Creating Intelligent Pipeline for Telecom Operators Based on Flow Operation
by: Kefei Liu
Published: (2012-08-01) -
Co-Competition for Telecom Operators Based on Construction of the Intelligent City
by: Kefei Liu, et al.
Published: (2012-09-01) -
Progress of automatic driving technology and future information service architecture evolution of telecom operators
by: Zhen YANG
Published: (2016-08-01) -
Research on knowledge graph construction technology for cyber threat intelligence based on large language models
by: LAI Qingnan, et al.
Published: (2024-11-01)