| 1 |
|
| 2 |
OMAR Z M , IBRAHIM J . An overview of darknet, rise and challenges and its assumptions. International Journal of Computer Science and Information Technology, 2020, 8(3): 110- 116.
|
| 3 |
赵新强, 范博, 张东举. 基于威胁发现的APT攻击防御体系研究. 信息网络安全, 2024, 24(7): 1122- 1128.
|
|
ZHAO X Q , FAN B , ZHANG D J . Research on APT attack defense system based on threat discovery. Netinfo Security, 2024, 24(7): 1122- 1128.
|
| 4 |
胡锦枫, 徐晓瑀, 陈云芳, 等. 基于v3洋葱域名的比特币地址威胁程度分析. 计算机工程, 2024, 50(3): 173- 181.
doi: 10.19678/j.issn.1000-3428.0066649
|
|
HU J F , XU X Y , CHEN Y F , et al. Threat level analysis of Bitcoin address based on v3 onion domain name. Computer Engineering, 2024, 50(3): 173- 181.
doi: 10.19678/j.issn.1000-3428.0066649
|
| 5 |
|
| 6 |
SARWAR M B , HANIF M K , TALIB R , et al. DarkDetect: darknet traffic detection and categorization using modified convolution-long short-term memory. IEEE Access, 2021, 9, 113705- 113713.
doi: 10.1109/ACCESS.2021.3105000
|
| 7 |
SANGHER K S , SINGH A , PANDEY H M . LSTM and BERT based transformers models for cyber threat intelligence for intent identification of social media platforms exploitation from darknet forums. International Journal of Information Technology, 2024, 16(8): 5277- 5292.
doi: 10.1007/s41870-024-02077-5
|
| 8 |
MOHANTY H , ROUDSARI A H , LASHKARI A H . Robust stacking ensemble model for darknet traffic classification under adversarial settings. Computers & Security, 2022, 120, 102830.
|
| 9 |
DEGUARA N, ARSHAD J, PARACHA A, et al. Threat miner-a text analysis engine for threat identification using dark web data[C]//Proceedings of the IEEE International Conference on Big Data. Washington D.C., USA: IEEE Press, 2023: 3043-3052.
|
| 10 |
KADOGUCHI M, HAYASHI S, HASHIMOTO M, et al. Exploring the dark web for cyber threat intelligence using machine leaning[C]//Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI). Washington D.C., USA: IEEE Press, 2019: 200-202.
|
| 11 |
NUNES E, DIAB A, GUNN A, et al. Darknet and deepnet mining for proactive cybersecurity threat intelligence[C]//Proceedings of the IEEE Conference on Intelligence and Security Informatics (ISI). Washington D.C., USA: IEEE Press, 2016: 7-12.
|
| 12 |
LIAO X J, YUAN K, WANG X F, et al. Acing the IOC game: toward automatic discovery and analysis of open-source cyber threat intelligence[C]//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, USA: ACM Press, 2016: 755-766.
|
| 13 |
杨竣辉, 李苏晋. 融合位置和实体类别信息的中文命名实体识别. 计算机工程, 2025, 51(3): 113- 121.
doi: 10.19678/j.issn.1000-3428.0068741
|
|
YANG J H , LI S J . Chinese named entity recognition integrating positional and entity category information. Computer Engineering, 2025, 51(3): 113- 121.
doi: 10.19678/j.issn.1000-3428.0068741
|
| 14 |
|
| 15 |
|
| 16 |
WANG X R, LIU X P, AO S Q, et al. DNRTI: a large-scale dataset for named entity recognition in threat intelligence[C]//Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Washington D.C., USA: IEEE Press, 2021: 1842-1848.
|
| 17 |
EVANGELATOS P, ILIOU C, MAVROPOULOS T, et al. Named entity recognition in cyber threat intelligence using transformer-based models[C]//Proceedings of the IEEE International Conference on Cyber Security and Resilience (CSR). Washington D.C., USA: IEEE Press, 2021: 348-353.
|
| 18 |
YANG Y R, LIU Z, SONG J X. TRAPPER: learning with weak supervision for threat intelligence entity recognition[C]//Proceedings of the 4th International Conference on Advanced Information Science and System. Washington D.C., USA: IEEE Press, 2023: 1-7.
|
| 19 |
|
| 20 |
|
| 21 |
DEVLIN J, CHANG M W, LEE K, et al. BERT: pre-training of deep bidirectional transformers for language understanding[EB/OL]. [2023-08-05]. https://arxiv.org/abs/1810.04805.
|
| 22 |
WANG X R, HE S H, XIONG Z H, et al. APTNER: a specific dataset for NER missions in cyber threat intelligence field[C]//Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD). Washington D.C., USA: IEEE Press, 2022: 1233-1238.
|
| 23 |
|
| 24 |
WHITE L, TOGNERI R, LIU W, et al. How well sentence embeddings capture meaning[C]//Proceedings of the 20th Australasian Document Computing Symposium. New York, USA: ACM Press, 2015: 1-8.
|
| 25 |
XIANG G , SHI C , ZHANG Y S . An APT event extraction method based on BERT-BiGRU-CRF for APT attack detection. Electronics, 2023, 12(15): 3349.
doi: 10.3390/electronics12153349
|