LLM-Based Cyber Threat Analysis Report: Automated Attack Technique Analysis Technology
Yonghyeon Park, Changhee Choi, Journal of Internet Computing and Services, Vol. 26, No. 4, pp. 9-18, Aug. 2025
Keywords: LLM, finetuning, MITRE ATT&CK, cyber attack technique
Abstract
Statistics
Show / Hide Statistics
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
|
Cite this article
[APA Style]
Park, Y. & Choi, C. (2025). LLM-Based Cyber Threat Analysis Report: Automated Attack Technique Analysis Technology. Journal of Internet Computing and Services, 26(4), 9-18. DOI: 10.7472/jksii.2025.26.4.9.
[IEEE Style]
Y. Park and C. Choi, "LLM-Based Cyber Threat Analysis Report: Automated Attack Technique Analysis Technology," Journal of Internet Computing and Services, vol. 26, no. 4, pp. 9-18, 2025. DOI: 10.7472/jksii.2025.26.4.9.
[ACM Style]
Yonghyeon Park and Changhee Choi. 2025. LLM-Based Cyber Threat Analysis Report: Automated Attack Technique Analysis Technology. Journal of Internet Computing and Services, 26, 4, (2025), 9-18. DOI: 10.7472/jksii.2025.26.4.9.

