Securebert: A domain-specific language model for cybersecurity
Abstract Natural Language Processing (NLP) has recently gained wide attention in
cybersecurity, particularly in Cyber Threat Intelligence (CTI) and cyber automation …
cybersecurity, particularly in Cyber Threat Intelligence (CTI) and cyber automation …
A machine learning approach for the NLP-based analysis of cyber threats and vulnerabilities of the healthcare ecosystem
Digitization in healthcare systems, with the wid adoption of Electronic Health Records,
connected medical devices, software and systems providing efficient healthcare service …
connected medical devices, software and systems providing efficient healthcare service …
Cybert: Cybersecurity claim classification by fine-tuning the bert language model
We introduce CyBERT, a cybersecurity feature claims classifier based on bidirectional
encoder representations from transformers and a key component in our semi-automated …
encoder representations from transformers and a key component in our semi-automated …
NLP-Based Techniques for Cyber Threat Intelligence
In the digital era, threat actors employ sophisticated techniques for which, often, digital
traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to …
traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to …
A novel feature integration and entity boundary detection for named entity recognition in cybersecurity
X Wang, J Liu - Knowledge-Based Systems, 2023 - Elsevier
Owing to continuous cyberattacks, a large amount of threat intelligence is generated online
every day. However, threat intelligence is mostly unstructured and multisource …
every day. However, threat intelligence is mostly unstructured and multisource …
Study of word embeddings for enhanced cyber security named entity recognition
S Srivastava, B Paul, D Gupta - Procedia Computer Science, 2023 - Elsevier
A vast majority of cyber security information is in the form of unstructured text. A much-
needed task is to have a machine-assisted analysis of such information. Named Entity …
needed task is to have a machine-assisted analysis of such information. Named Entity …
Cyber threat assessment and management for securing healthcare ecosystems using natural language processing
The healthcare sectors have constantly faced significant challenge due to the rapid rise of
cyber threats. These threats can pose any potential risk within the system context and disrupt …
cyber threats. These threats can pose any potential risk within the system context and disrupt …
Transformer-based named entity recognition on drone flight logs to support forensic investigation
The increase in drone usage by the public brings the number of drone incident and attack
up. Sophisticated preventive mechanisms, as well as post-incident procedures and …
up. Sophisticated preventive mechanisms, as well as post-incident procedures and …
Aspect-level information discrepancies across heterogeneous vulnerability reports: Severity, types and detection methods
Vulnerable third-party libraries pose significant threats to software applications that reuse
these libraries. At an industry scale of reuse, manual analysis of third-party library …
these libraries. At an industry scale of reuse, manual analysis of third-party library …
Advanced Persistent Threats Based on Supply Chain Vulnerabilities: Challenges, Solutions & Future Directions
Due to the ever increasing inter-dependency across a variety of diverse software and
hardware components in Information and Communications Technology (ICT) provisioning …
hardware components in Information and Communications Technology (ICT) provisioning …