1 code implementation • 1 Jul 2022 • Peipei Liu, Hong Li, Zuoguang Wang, Jie Liu, Yimo Ren, Hongsong Zhu
Extracting cybersecurity entities such as attackers and vulnerabilities from unstructured network texts is an important part of security analysis.
no code implementations • 15 Mar 2022 • Zuoguang Wang, Yimo Ren, Hongsong Zhu, Limin Sun
This paper explores the threat detection for general Social Engineering (SE) attack using Machine Learning (ML) techniques, rather than focusing on or limited to a specific SE attack type, e. g. email phishing.