[1]
“PROACTIVE CYBERSECURITY THROUGH THREAT INTELLIGENCE MINING: A SURVEY OF TECHNIQUES AND TRENDS”, IJITCE, vol. 13, no. 2, pp. 707–714, Apr. 2025, doi: 10.62643/ijitce.2025.v13.i2.pp707-714.