Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Domain-specific knowledge graphs: A survey
B Abu-Salih - Journal of Network and Computer Applications, 2021 - Elsevier
Abstract Knowledge Graphs (KGs) have made a qualitative leap and effected a real
revolution in knowledge representation. This is leveraged by the underlying structure of the …
revolution in knowledge representation. This is leveraged by the underlying structure of the …
[HTML][HTML] Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical …
IH Sarker, H Janicke, MA Ferrag, A Abuadbba - Internet of Things, 2024 - Elsevier
Critical infrastructure (CI) typically refers to the essential physical and virtual systems, assets,
and services that are vital for the functioning and well-being of a society, economy, or nation …
and services that are vital for the functioning and well-being of a society, economy, or nation …
Security operations center: A systematic study and open challenges
Since the introduction of Security Operations Centers (SOCs) around 15 years ago, their
importance has grown significantly, especially over the last five years. This is mainly due to …
importance has grown significantly, especially over the last five years. This is mainly due to …
Cybersecurity knowledge graphs
LF Sikos - Knowledge and Information Systems, 2023 - Springer
Cybersecurity knowledge graphs, which represent cyber-knowledge with a graph-based
data model, provide holistic approaches for processing massive volumes of complex …
data model, provide holistic approaches for processing massive volumes of complex …
Cybert: Contextualized embeddings for the cybersecurity domain
We present CyBERT, a domain-specific Bidirectional Encoder Representations from
Transformers (BERT) model, fine-tuned with a large corpus of textual cybersecurity data …
Transformers (BERT) model, fine-tuned with a large corpus of textual cybersecurity data …
Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text
To counteract the rapidly evolving cyber threats, many research efforts have been made to
design cyber threat intelligence (CTI) systems that extract CTI data from publicly available …
design cyber threat intelligence (CTI) systems that extract CTI data from publicly available …
Ontologies and artificial intelligence systems for the cooperative smart farming ecosystem
Cyber-Physical Systems (CPS) and Internet of Thing (IoT) generate large amounts of data
spurring the rise of Artificial Intelligence (AI) based smart applications. Driven by rapid …
spurring the rise of Artificial Intelligence (AI) based smart applications. Driven by rapid …
A survey on cybersecurity knowledge graph construction
X Zhao, R Jiang, Y Han, A Li, Z Peng - Computers & Security, 2024 - Elsevier
The development of key technologies of knowledge graph (KG) has promoted the
development of machine cognition technology, and the combination of KG and industry as …
development of machine cognition technology, and the combination of KG and industry as …
[HTML][HTML] CyberEntRel: Joint extraction of cyber entities and relations using deep learning
The cyber threat intelligence (CTI) knowledge graph is beneficial for making robust defense
strategies for security professionals. These are built from cyber threat intelligence data …
strategies for security professionals. These are built from cyber threat intelligence data …
Knowledge graph fusion for smart systems: A survey
The emergence of various disruptive technologies such as big data, Internet of Things, and
artificial intelligence have instigated our society to generate enormous volumes of data. The …
artificial intelligence have instigated our society to generate enormous volumes of data. The …