A survey on cybersecurity knowledge graph construction

X Zhao, R Jiang, Y Han, A Li, Z Peng - Computers & Security, 2024 - Elsevier
The development of key technologies of knowledge graph (KG) has promoted the
development of machine cognition technology, and the combination of KG and industry as …

[HTML][HTML] Recent progress of using knowledge graph for cybersecurity

K Liu, F Wang, Z Ding, S Liang, Z Yu, Y Zhou - Electronics, 2022 - mdpi.com
In today's dynamic complex cyber environments, Cyber Threat Intelligence (CTI) and the risk
of cyberattacks are both increasing. This means that organizations need to have a strong …

Cyber threat intelligence model: an evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence

V Mavroeidis, S Bromander - 2017 European Intelligence and …, 2017 - ieeexplore.ieee.org
Threat intelligence is the provision of evidence-based knowledge about existing or potential
threats. Benefits of threat intelligence include improved efficiency and effectiveness in …

The rise of “malware”: Bibliometric analysis of malware study

MF Ab Razak, NB Anuar, R Salleh, A Firdaus - Journal of Network and …, 2016 - Elsevier
Malicious software (malware) is a computer program designed to create harmful and
undesirable effects. It considered as one of the many dangerous threats for Internet users …

Early detection of cybersecurity threats using collaborative cognition

SN Narayanan, A Ganesan, K Joshi… - 2018 IEEE 4th …, 2018 - ieeexplore.ieee.org
The early detection of cybersecurity events such as attacks is challenging given the
constantly evolving threat landscape. Even with advanced monitoring, sophisticated …

A review of knowledge graph application scenarios in cyber security

K Liu, F Wang, Z Ding, S Liang, Z Yu, Y Zhou - arxiv preprint arxiv …, 2022 - arxiv.org
Facing the dynamic complex cyber environments, internal and external cyber threat
intelligence, and the increasing risk of cyber-attack, knowledge graphs show great …

Data-driven threat hunting using sysmon

V Mavroeidis, A Jøsang - … of the 2nd international conference on …, 2018 - dl.acm.org
Threat actors can be persistent, motivated and agile, and they leverage a diversified and
extensive set of tactics, techniques, and procedures to attain their goals. In response to that …

Threatkg: A threat knowledge graph for automated open-source cyber threat intelligence gathering and management

P Gao, X Liu, E Choi, S Ma, X Yang, Z Ji… - arxiv preprint arxiv …, 2022 - arxiv.org
Despite the increased adoption of open-source cyber threat intelligence (OSCTI) for
acquiring knowledge about cyber threats, little effort has been made to harvest knowledge …

A framework for conceptual characterization of ontologies and its application in the cybersecurity domain

BF Martins, LJ Serrano Gil, JF Reyes Román… - Software and Systems …, 2022 - Springer
Organizations are actively seeking efficient solutions for the management and protection of
their assets. However, Cybersecurity is a vast and complex domain, especially for large …

Conceptual characterization of cybersecurity ontologies

BF Martins, L Serrano, JF Reyes, JI Panach… - … Working Conference on …, 2020 - Springer
Cybersecurity is known as the practice of protecting systems from digital attacks.
Organizations are seeking efficient solutions for the management and protection of their …