Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Recent progress of using knowledge graph for cybersecurity
In today's dynamic complex cyber environments, Cyber Threat Intelligence (CTI) and the risk
of cyberattacks are both increasing. This means that organizations need to have a strong …
of cyberattacks are both increasing. This means that organizations need to have a strong …
What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A survey
Cybersecurity researchers have contributed to the automated extraction of CTI from textual
sources, such as threat reports and online articles describing cyberattack strategies …
sources, such as threat reports and online articles describing cyberattack strategies …
[HTML][HTML] Open-cykg: An open cyber threat intelligence knowledge graph
Instant analysis of cybersecurity reports is a fundamental challenge for security experts as
an immeasurable amount of cyber information is generated on a daily basis, which …
an immeasurable amount of cyber information is generated on a daily basis, which …
Develo** an ontology for cyber security knowledge graphs
M Iannacone, S Bohn, G Nakamura, J Gerth… - Proceedings of the 10th …, 2015 - dl.acm.org
In this paper we describe an ontology developed for a cyber security knowledge graph
database. This is intended to provide an organized schema that incorporates information …
database. This is intended to provide an organized schema that incorporates information …
Creating cybersecurity knowledge graphs from malware after action reports
After Action Reports (AARs) provide incisive analysis of cyber-incidents. Extracting cyber-
knowledge from these sources would provide security analysts with credible information …
knowledge from these sources would provide security analysts with credible information …
A novel feature integration and entity boundary detection for named entity recognition in cybersecurity
X Wang, J Liu - Knowledge-Based Systems, 2023 - Elsevier
Owing to continuous cyberattacks, a large amount of threat intelligence is generated online
every day. However, threat intelligence is mostly unstructured and multisource …
every day. However, threat intelligence is mostly unstructured and multisource …
Relext: Relation extraction using deep learning approaches for cybersecurity knowledge graph improvement
Security Analysts that work in a'Security Operations Center'(SoC) play a major role in
ensuring the security of the organization. The amount of background knowledge they have …
ensuring the security of the organization. The amount of background knowledge they have …
Automatic extraction of named entities of cyber threats using a deep Bi-LSTM-CRF network
Countless cyber threat intelligence (CTI) reports are used by companies around the world
on a daily basis for security reasons. To secure critical cybersecurity information, analysts …
on a daily basis for security reasons. To secure critical cybersecurity information, analysts …
Study of word embeddings for enhanced cyber security named entity recognition
S Srivastava, B Paul, D Gupta - Procedia Computer Science, 2023 - Elsevier
A vast majority of cyber security information is in the form of unstructured text. A much-
needed task is to have a machine-assisted analysis of such information. Named Entity …
needed task is to have a machine-assisted analysis of such information. Named Entity …
Using bert and augmentation in named entity recognition for cybersecurity domain
The paper presents the results of applying the BERT representation model in the named
entity recognition task for the cybersecurity domain in Russian. Several variants of the model …
entity recognition task for the cybersecurity domain in Russian. Several variants of the model …