Cybersecurity knowledge graphs

LF Sikos - Knowledge and Information Systems, 2023 - Springer
Cybersecurity knowledge graphs, which represent cyber-knowledge with a graph-based
data model, provide holistic approaches for processing massive volumes of complex …

A survey on cybersecurity knowledge graph construction

X Zhao, R Jiang, Y Han, A Li, Z Peng - Computers & Security, 2023 - Elsevier
The development of key technologies of knowledge graph (KG) has promoted the
development of machine cognition technology, and the combination of KG and industry as …

Generating fake cyber threat intelligence using transformer-based models

P Ranade, A Piplai, S Mittal, A Joshi… - 2021 International Joint …, 2021 - ieeexplore.ieee.org
Cyber-defense systems are being developed to automatically ingest Cyber Threat
Intelligence (CTI) that contains semi-structured data and/or text to populate knowledge …

Impacts and risk of generative AI technology on cyber defense

S Neupane, IA Fernandez, S Mittal… - arXiv preprint arXiv …, 2023 - arxiv.org
Generative Artificial Intelligence (GenAI) has emerged as a powerful technology capable of
autonomously producing highly realistic content in various domains, such as text, images …

Computational understanding of narratives: A survey

P Ranade, S Dey, A Joshi, T Finin - IEEE Access, 2022 - ieeexplore.ieee.org
Storytelling, and the delivery of societal narratives, enable human beings to communicate,
connect, and understand one another and the world around them. Narratives can be defined …

Combating fake cyber threat intelligence using provenance in cybersecurity knowledge graphs

S Mitra, A Piplai, S Mittal, A Joshi - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Today there is a significant amount of fake cybersecurity related intelligence on the internet.
To filter out such information, we build a system to capture the provenance information and …

Privetab: Secure and privacy-preserving sharing of tabular data

A Kotal, A Piplai, SSL Chukkapalli, A Joshi - Proceedings of the 2022 …, 2022 - dl.acm.org
Machine Learning has increased our ability to model large quantities of data efficiently in a
short time. Machine learning approaches in many application domains require collecting …

Knowledge guided two-player reinforcement learning for cyber attacks and defenses

A Piplai, M Anoruo, K Fasaye, A Joshi… - 2022 21st IEEE …, 2022 - ieeexplore.ieee.org
Cyber defense exercises are an important avenue to understand the technical capacity of
organizations when faced with cyber-threats. Information derived from these exercises often …

Knowledge-enhanced neurosymbolic artificial intelligence for cybersecurity and privacy

A Piplai, A Kotal, S Mohseni, M Gaur… - IEEE Internet …, 2023 - ieeexplore.ieee.org
Neurosymbolic artificial intelligence (AI) is an emerging and quickly advancing field that
combines the subsymbolic strengths of (deep) neural networks and the explicit, symbolic …

Research and challenges of reinforcement learning in cyber defense decision-making for intranet security

W Wang, D Sun, F Jiang, X Chen, C Zhu - Algorithms, 2022 - mdpi.com
In recent years, cyber attacks have shown diversified, purposeful, and organized
characteristics, which pose significant challenges to cyber defense decision-making on …