A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior
2020
2020 IEEE International Conference on Intelligence and Security Informatics (ISI)
Security engineers and researchers use their disparate knowledge and discretion to identify malware present in a system. Sometimes, they may also use previously extracted knowledge and available Cyber Threat Intelligence (CTI) about known attacks to establish a pattern. To aid in this process, they need knowledge about malware behavior mapped to the available CTI. Such mappings enrich our representations and also helps verify the information. In this paper, we describe how we retrieve malware
doi:10.1109/isi49825.2020.9280512
fatcat:g6vl3mypu5ht3brbsb5e4msxfq