Research Article
EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning
Table 6
Performance comparison of the three methods.
| |||||||||||||||||||||||||||||||||||||||||||||||||
The bold values represent the maximum values of each metric. |
| |||||||||||||||||||||||||||||||||||||||||||||||||
The bold values represent the maximum values of each metric. |