@Misc{Combating_Fake_Cyber_Threat_Intelligence_using_Provenance_in_Cybersecurity_Knowledge_Graphs,
author = "Shaswata Mitra, Aritran Piplai, Sudip Mittal, and Anupam Joshi",
title = "{Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs}",
month = "January",
year = "2022",
note = "<img src="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2021/12/ckg_prov.png" style="display: block; margin-left: auto; margin-right: auto; max-width: 100%; height: auto;">
<meta name="twitter:image" content="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2021/12/ckg_prov.png">",
booktitle = "IEEE International Conference on Big Data 2021",
publisher = "IEEE",
}