Cite
Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks in Real-time through Cyber Threat Intelligence Reports
MLA
Zhu, Tiantian, et al. Nip in the Bud: Forecasting and Interpreting Post-Exploitation Attacks in Real-Time through Cyber Threat Intelligence Reports. 2024. EBSCOhost, widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsarx&AN=edsarx.2405.02826&authtype=sso&custid=ns315887.
APA
Zhu, T., Ying, J., Chen, T., Xiong, C., Cheng, W., Yuan, Q., Zheng, A., Lv, M., & Chen, Y. (2024). Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks in Real-time through Cyber Threat Intelligence Reports.
Chicago
Zhu, Tiantian, Jie Ying, Tieming Chen, Chunlin Xiong, Wenrui Cheng, Qixuan Yuan, Aohan Zheng, Mingqi Lv, and Yan Chen. 2024. “Nip in the Bud: Forecasting and Interpreting Post-Exploitation Attacks in Real-Time through Cyber Threat Intelligence Reports.” http://widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsarx&AN=edsarx.2405.02826&authtype=sso&custid=ns315887.