[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …
[HTML][HTML] Cyber risk and cybersecurity: a systematic review of data availability
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …
indicating an increase of more than 50% since 2018. With the average cyber insurance …
[HTML][HTML] Open-cykg: An open cyber threat intelligence knowledge graph
Instant analysis of cybersecurity reports is a fundamental challenge for security experts as
an immeasurable amount of cyber information is generated on a daily basis, which …
an immeasurable amount of cyber information is generated on a daily basis, which …
A survey on cybersecurity knowledge graph construction
X Zhao, R Jiang, Y Han, A Li, Z Peng - Computers & Security, 2024 - Elsevier
The development of key technologies of knowledge graph (KG) has promoted the
development of machine cognition technology, and the combination of KG and industry as …
development of machine cognition technology, and the combination of KG and industry as …
Recent progress of using knowledge graph for cybersecurity
In today's dynamic complex cyber environments, Cyber Threat Intelligence (CTI) and the risk
of cyberattacks are both increasing. This means that organizations need to have a strong …
of cyberattacks are both increasing. This means that organizations need to have a strong …
[HTML][HTML] Cyber threat attribution using unstructured reports in cyber threat intelligence
E Irshad, AB Siddiqui - Egyptian Informatics Journal, 2023 - Elsevier
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a
challenging task as attacker uses different obfuscation and deception techniques to hide its …
challenging task as attacker uses different obfuscation and deception techniques to hide its …
Cyner: A python library for cybersecurity named entity recognition
Open Cyber threat intelligence (OpenCTI) information is available in an unstructured format
from heterogeneous sources on the Internet. We present CyNER, an open-source python …
from heterogeneous sources on the Internet. We present CyNER, an open-source python …
A novel feature integration and entity boundary detection for named entity recognition in cybersecurity
X Wang, J Liu - Knowledge-Based Systems, 2023 - Elsevier
Owing to continuous cyberattacks, a large amount of threat intelligence is generated online
every day. However, threat intelligence is mostly unstructured and multisource …
every day. However, threat intelligence is mostly unstructured and multisource …
A review on cyber security named entity recognition
With the rapid development of Internet technology and the advent of the era of big data,
more and more cyber security texts are provided on the Internet. These texts include not only …
more and more cyber security texts are provided on the Internet. These texts include not only …
A review of knowledge graph application scenarios in cyber security
Facing the dynamic complex cyber environments, internal and external cyber threat
intelligence, and the increasing risk of cyber-attack, knowledge graphs show great …
intelligence, and the increasing risk of cyber-attack, knowledge graphs show great …