@Misc{Combating_Fake_Cyber_Threat_Intelligence_using_Provenance_in_Cybersecurity_Knowledge_Graphs, author = "Shaswata Mitra, Aritran Piplai, Sudip Mittal, and Anupam Joshi", title = "{Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs}", month = "January", year = "2022", note = "<img src="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2021/12/ckg_prov.png" style="display: block; margin-left: auto; margin-right: auto; max-width: 100%; height: auto;"> <meta name="twitter:image" content="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2021/12/ckg_prov.png">", booktitle = "IEEE International Conference on Big Data 2021", publisher = "IEEE", }