<![CDATA[UMBC ebiquity RSS Tag Search]]> <![CDATA[Generating Fake Cyber Threat Intelligence Using Transformer-Based Models]]> http://ebiquity.umbc.edu/paper/html/id/969/Generating-Fake-Cyber-Threat-Intelligence-Using-Transformer-Based-Models 2021-07-22 <![CDATA[CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities]]> http://ebiquity.umbc.edu/paper/html/id/752/CyberTwitter-Using-Twitter-to-generate-alerts-for-Cybersecurity-Threats-and-Vulnerabilities 2016-08-19