Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Rezvan Mahdavi Hezaveh"'
Publikováno v:
ACM Computing Surveys. 55:1-36
Cybersecurity researchers have contributed to the automated extraction of CTI from textual sources, such as threat reports and online articles describing cyberattack strategies, procedures, and tools. The goal of this article is to aid cybersecurity
Publikováno v:
Information and Software Technology. 108:65-77
Context: Infrastructure as code (IaC) is the practice to automatically configure system dependencies and to provision local and remote instances. Practitioners consider IaC as a fundamental pillar to implement DevOps practices, which helps them to ra
Publikováno v:
Information and Software Technology. 145:106813
Publikováno v:
ICDM (Workshops)
Cyberthreat defense mechanisms have become more proactive these days, and thus leading to the increasing incorporation of cyberthreat intelligence (CTI). Cybersecurity researchers and vendors are powering the CTI with large volumes of unstructured te
Background: Using feature toggles is a technique that allows developers to either turn a feature on or off with a variable in a conditional statement. Feature toggles are increasingly used by software companies to facilitate continuous integration an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f3b543106dbde7d635f11b55d1bba2e0