0
LLM-TIKG: Threat intelligence knowledge graph construction utilizing large language model
(www.sciencedirect.com)
2
Inside the Kimsuky Leak: How the “Kim” Dump Exposed North Korea’s Credential Theft Playbook
(dti.domaintools.com)