no code implementations • 9 Aug 2018 • Lorenzo Neil, Sudip Mittal, Anupam Joshi
We represent and store this threat intelligence, along with the software dependencies in a security knowledge graph.