[HTML][HTML] Recent progress of using knowledge graph for cybersecurity

K Liu, F Wang, Z Ding, S Liang, Z Yu, Y Zhou - Electronics, 2022 - mdpi.com
In today's dynamic complex cyber environments, Cyber Threat Intelligence (CTI) and the risk
of cyberattacks are both increasing. This means that organizations need to have a strong …

What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A survey

MR Rahman, RM Hezaveh, L Williams - ACM Computing Surveys, 2023 - dl.acm.org
Cybersecurity researchers have contributed to the automated extraction of CTI from textual
sources, such as threat reports and online articles describing cyberattack strategies …

[HTML][HTML] Open-cykg: An open cyber threat intelligence knowledge graph

I Sarhan, M Spruit - Knowledge-Based Systems, 2021 - Elsevier
Instant analysis of cybersecurity reports is a fundamental challenge for security experts as
an immeasurable amount of cyber information is generated on a daily basis, which …

Develo** an ontology for cyber security knowledge graphs

M Iannacone, S Bohn, G Nakamura, J Gerth… - Proceedings of the 10th …, 2015 - dl.acm.org
In this paper we describe an ontology developed for a cyber security knowledge graph
database. This is intended to provide an organized schema that incorporates information …

Creating cybersecurity knowledge graphs from malware after action reports

A Piplai, S Mittal, A Joshi, T Finin, J Holt, R Zak - IEEE Access, 2020 - ieeexplore.ieee.org
After Action Reports (AARs) provide incisive analysis of cyber-incidents. Extracting cyber-
knowledge from these sources would provide security analysts with credible information …

A novel feature integration and entity boundary detection for named entity recognition in cybersecurity

X Wang, J Liu - Knowledge-Based Systems, 2023 - Elsevier
Owing to continuous cyberattacks, a large amount of threat intelligence is generated online
every day. However, threat intelligence is mostly unstructured and multisource …

Relext: Relation extraction using deep learning approaches for cybersecurity knowledge graph improvement

A **le, A Piplai, S Mittal, A Joshi, J Holt… - Proceedings of the 2019 …, 2019 - dl.acm.org
Security Analysts that work in a'Security Operations Center'(SoC) play a major role in
ensuring the security of the organization. The amount of background knowledge they have …

Automatic extraction of named entities of cyber threats using a deep Bi-LSTM-CRF network

G Kim, C Lee, J Jo, H Lim - International journal of machine learning and …, 2020 - Springer
Countless cyber threat intelligence (CTI) reports are used by companies around the world
on a daily basis for security reasons. To secure critical cybersecurity information, analysts …

Study of word embeddings for enhanced cyber security named entity recognition

S Srivastava, B Paul, D Gupta - Procedia Computer Science, 2023 - Elsevier
A vast majority of cyber security information is in the form of unstructured text. A much-
needed task is to have a machine-assisted analysis of such information. Named Entity …

Using bert and augmentation in named entity recognition for cybersecurity domain

M Tikhomirov, N Loukachevitch, A Sirotina… - … and Information Systems …, 2020 - Springer
The paper presents the results of applying the BERT representation model in the named
entity recognition task for the cybersecurity domain in Russian. Several variants of the model …