Fig. 5From: TIM: threat context-enhanced TTP intelligence mining on unstructured threat dataWe use TTP descriptions and TTP elements obtained from the TIM framework for threat detection and intelligence sharingBack to article page