@Misc{Combating_Fake_Cyber_Threat_Intelligence_using_Provenance_in_Cybersecurity_Knowledge_Graphs,
	author = "Shaswata Mitra, Aritran Piplai, Sudip Mittal, and Anupam Joshi",
	title = "{Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs}",
	month = "January",
	year = "2022",
	note = "<img src="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2021/12/ckg_prov.png" style="display: block; margin-left: auto; margin-right: auto; max-width: 100%; height: auto;">
<meta name="twitter:image" content="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2021/12/ckg_prov.png">",
	booktitle = "IEEE International Conference on Big Data 2021",
	publisher = "IEEE",
}