Securebert: A domain-specific language model for cybersecurity

E Aghaei, X Niu, W Shadid, E Al-Shaer - International Conference on …, 2022 - Springer
Abstract Natural Language Processing (NLP) has recently gained wide attention in
cybersecurity, particularly in Cyber Threat Intelligence (CTI) and cyber automation …

A machine learning approach for the NLP-based analysis of cyber threats and vulnerabilities of the healthcare ecosystem

S Silvestri, S Islam, S Papastergiou, C Tzagkarakis… - Sensors, 2023 - mdpi.com
Digitization in healthcare systems, with the wid adoption of Electronic Health Records,
connected medical devices, software and systems providing efficient healthcare service …

Cybert: Cybersecurity claim classification by fine-tuning the bert language model

K Ameri, M Hempel, H Sharif, J Lopez Jr… - Journal of Cybersecurity …, 2021 - mdpi.com
We introduce CyBERT, a cybersecurity feature claims classifier based on bidirectional
encoder representations from transformers and a key component in our semi-automated …

NLP-Based Techniques for Cyber Threat Intelligence

M Arazzi, DR Arikkat, S Nicolazzo, A Nocera… - arxiv preprint arxiv …, 2023 - arxiv.org
In the digital era, threat actors employ sophisticated techniques for which, often, digital
traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to …

A novel feature integration and entity boundary detection for named entity recognition in cybersecurity

X Wang, J Liu - Knowledge-Based Systems, 2023 - Elsevier
Owing to continuous cyberattacks, a large amount of threat intelligence is generated online
every day. However, threat intelligence is mostly unstructured and multisource …

Study of word embeddings for enhanced cyber security named entity recognition

S Srivastava, B Paul, D Gupta - Procedia Computer Science, 2023 - Elsevier
A vast majority of cyber security information is in the form of unstructured text. A much-
needed task is to have a machine-assisted analysis of such information. Named Entity …

Cyber threat assessment and management for securing healthcare ecosystems using natural language processing

S Silvestri, S Islam, D Amelin, G Weiler… - International Journal of …, 2024 - Springer
The healthcare sectors have constantly faced significant challenge due to the rapid rise of
cyber threats. These threats can pose any potential risk within the system context and disrupt …

Transformer-based named entity recognition on drone flight logs to support forensic investigation

S Silalahi, T Ahmad, H Studiawan - IEEE Access, 2023 - ieeexplore.ieee.org
The increase in drone usage by the public brings the number of drone incident and attack
up. Sophisticated preventive mechanisms, as well as post-incident procedures and …

Aspect-level information discrepancies across heterogeneous vulnerability reports: Severity, types and detection methods

J Sun, Z **ng, X **a, Q Lu, X Xu, L Zhu - ACM Transactions on Software …, 2023 - dl.acm.org
Vulnerable third-party libraries pose significant threats to software applications that reuse
these libraries. At an industry scale of reuse, manual analysis of third-party library …

Advanced Persistent Threats Based on Supply Chain Vulnerabilities: Challenges, Solutions & Future Directions

Z Tan, SP Parambath… - IEEE Internet of …, 2025 - ieeexplore.ieee.org
Due to the ever increasing inter-dependency across a variety of diverse software and
hardware components in Information and Communications Technology (ICT) provisioning …