A survey on cybersecurity knowledge graph construction
X Zhao, R Jiang, Y Han, A Li, Z Peng - Computers & Security, 2024 - Elsevier
The development of key technologies of knowledge graph (KG) has promoted the
development of machine cognition technology, and the combination of KG and industry as …
development of machine cognition technology, and the combination of KG and industry as …
What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A survey
Cybersecurity researchers have contributed to the automated extraction of CTI from textual
sources, such as threat reports and online articles describing cyberattack strategies …
sources, such as threat reports and online articles describing cyberattack strategies …
Cskg4apt: A cybersecurity knowledge graph for advanced persistent threat organization attribution
Y Ren, Y **ao, Y Zhou, Z Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Open-source cyber threat intelligence (OSCTI) is becoming more influential in obtaining
current network security information. Most studies on cyber threat intelligence (CTI) focus on …
current network security information. Most studies on cyber threat intelligence (CTI) focus on …
[HTML][HTML] Open-cykg: An open cyber threat intelligence knowledge graph
Instant analysis of cybersecurity reports is a fundamental challenge for security experts as
an immeasurable amount of cyber information is generated on a daily basis, which …
an immeasurable amount of cyber information is generated on a daily basis, which …
Automatic extraction of named entities of cyber threats using a deep Bi-LSTM-CRF network
Countless cyber threat intelligence (CTI) reports are used by companies around the world
on a daily basis for security reasons. To secure critical cybersecurity information, analysts …
on a daily basis for security reasons. To secure critical cybersecurity information, analysts …
CTI view: APT threat intelligence analysis system
Y Zhou, Y Tang, M Yi, C **, H Lu - Security and Communication …, 2022 - Wiley Online Library
With the development of advanced persistent threat (APT) and the increasingly severe
situation of network security, the strategic defense idea with the concept of “active defense …
situation of network security, the strategic defense idea with the concept of “active defense …
Automated event extraction of CVE descriptions
Context: The dramatically increasing number of vulnerabilities makes manual vulnerability
analysis increasingly more difficult. Automatic extraction of vulnerability information can help …
analysis increasingly more difficult. Automatic extraction of vulnerability information can help …
Cdtier: A Chinese dataset of threat intelligence entity relationships
Cyber Threat Intelligence (CTI), which is knowledge of cyberspace threats gathered from
security data, is critical in defending against cyberattacks. However, there is no open-source …
security data, is critical in defending against cyberattacks. However, there is no open-source …
Natural language processing model for automatic analysis of cybersecurity-related documents
TM Georgescu - Symmetry, 2020 - mdpi.com
This paper describes the development and implementation of a natural language
processing model based on machine learning which performs cognitive analysis for …
processing model based on machine learning which performs cognitive analysis for …
A comparative study of deep learning based named entity recognition algorithms for cybersecurity
Named Entity Recognition (NER) is important in the cybersecurity domain. It helps
researchers extract cyber threat information from unstructured text sources. The extracted …
researchers extract cyber threat information from unstructured text sources. The extracted …