Search Results for author: Md Rayhanur Rahman

Found 3 papers, 0 papers with code

Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports

no code implementations3 Jan 2024 Md Rayhanur Rahman, Brandon Wroblewski, Quinn Matthews, Brantley Morgan, Tim Menzies, Laurie Williams

The goal of this paper is to aid security practitioners in prioritizing and proactive defense against cyberattacks by mining temporal attack patterns from cyberthreat intelligence reports.

From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts

no code implementations5 Oct 2022 Md Rayhanur Rahman, Laurie Williams

\textit{The goal of this study is to aid cybersecurity researchers and practitioners choose attack technique extraction methods for monitoring and sharing threat intelligence by comparing the underlying methods from the TTP extraction studies in the literature.}

What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey

no code implementations14 Sep 2021 Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams

Cybersecurity researchers have contributed to the automated extraction of CTI from textual sources, such as threat reports and online articles, where cyberattack strategies, procedures, and tools are described.

Decision Making Dependency Parsing +3

Cannot find the paper you are looking for? You can Submit a new open access paper.