-
http://ebiquity.umbc.edu/paper/html/id/969/Generating-Fake-Cyber-Threat-Intelligence-Using-Transformer-Based-Models
2021-07-22
-
http://ebiquity.umbc.edu/paper/html/id/752/CyberTwitter-Using-Twitter-to-generate-alerts-for-Cybersecurity-Threats-and-Vulnerabilities
2016-08-19