A Cyber Security Knowledge Graph for Advanced Persistent Threat Organization Attribution

This academic report, published in the International Journal of Innovative Research in Science, Engineering and Technology, explores the use of open-source cyber threat intelligence (OSCTI) in enhancing network security. It particularly focuses on how OSCTI can be applied to create cybersecurity knowledge graphs that help in the attribution of Advanced Persistent Threats (APTs) by organizing and visualizing complex data. This research is significant for understanding the relationships and characteristics of cybersecurity threats in a systematic way.

Download the report

Checksums

  • MD5: 9b1eb3a0615c53a968089fc79a4bede9
  • SHA256: 2e509d67eab9bb6371187be30d30bc7da965bcc25e426a01813c85d457b5cb16
  • SHA1: cf7f995a157ca265cb577602d173ffab9d83478e
  • AI Powered

    This post has been published by an AI powered process. It might be prone to errors and attribution. Feel free to contact us via the contact page to fix any issues you have seen. As always all credit and ownership goes to the official authors and owners of the papers. CryptaScripta does not own any rights on these documents.