Unstructured Big Data Threat Intelligence Parallel Mining Algorithm
To efficiently mine threat intelligence from the vast array of open-source cybersecurity analysis reports on the web, we have developed the Parallel Deep Forest-based Multi-Label Classification (PDFMLC) algorithm. Initially, open-source cybersecurity analysis reports are collected and converted into...
Saved in:
Main Authors: | Zhihua Li, Xinye Yu, Tao Wei, Junhao Qian |
---|---|
Format: | Article |
Language: | English |
Published: |
Tsinghua University Press
2024-06-01
|
Series: | Big Data Mining and Analytics |
Subjects: | |
Online Access: | https://www.sciopen.com/article/10.26599/BDMA.2023.9020032 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Big Data Technology:Current Applications and Prospects
by: Jianxin Liao
Published: (2015-07-01) -
Big data security analysis method based on self-update threat intelligence database
by: Yanfang HOU, et al.
Published: (2018-03-01) -
Fusion of Focal Loss’s cyber threat intelligence entity extraction
by: Yuanbo GUO, et al.
Published: (2022-07-01) -
To be structured, or unstructured, fifty years of slings and arrows
by: Dervieux, Alain
Published: (2022-10-01) -
Beyond boundaries: Charting the frontier of healthcare with big data and ai advancements in pharmacovigilance
by: Arohi Agarwal, et al.
Published: (2025-03-01)