[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions

R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …

[HTML][HTML] Cyber risk and cybersecurity: a systematic review of data availability

F Cremer, B Sheehan, M Fortmann, AN Kia… - The Geneva papers …, 2022 - ncbi.nlm.nih.gov
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …

[HTML][HTML] Open-cykg: An open cyber threat intelligence knowledge graph

I Sarhan, M Spruit - Knowledge-Based Systems, 2021 - Elsevier
Instant analysis of cybersecurity reports is a fundamental challenge for security experts as
an immeasurable amount of cyber information is generated on a daily basis, which …

A survey on cybersecurity knowledge graph construction

X Zhao, R Jiang, Y Han, A Li, Z Peng - Computers & Security, 2024 - Elsevier
The development of key technologies of knowledge graph (KG) has promoted the
development of machine cognition technology, and the combination of KG and industry as …

Recent progress of using knowledge graph for cybersecurity

K Liu, F Wang, Z Ding, S Liang, Z Yu, Y Zhou - Electronics, 2022 - mdpi.com
In today's dynamic complex cyber environments, Cyber Threat Intelligence (CTI) and the risk
of cyberattacks are both increasing. This means that organizations need to have a strong …

[HTML][HTML] Cyber threat attribution using unstructured reports in cyber threat intelligence

E Irshad, AB Siddiqui - Egyptian Informatics Journal, 2023 - Elsevier
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a
challenging task as attacker uses different obfuscation and deception techniques to hide its …

Cyner: A python library for cybersecurity named entity recognition

MT Alam, D Bhusal, Y Park, N Rastogi - arXiv preprint arXiv:2204.05754, 2022 - arxiv.org
Open Cyber threat intelligence (OpenCTI) information is available in an unstructured format
from heterogeneous sources on the Internet. We present CyNER, an open-source python …

A novel feature integration and entity boundary detection for named entity recognition in cybersecurity

X Wang, J Liu - Knowledge-Based Systems, 2023 - Elsevier
Owing to continuous cyberattacks, a large amount of threat intelligence is generated online
every day. However, threat intelligence is mostly unstructured and multisource …

A review on cyber security named entity recognition

C Gao, X Zhang, M Han, H Liu - Frontiers of Information Technology & …, 2021 - Springer
With the rapid development of Internet technology and the advent of the era of big data,
more and more cyber security texts are provided on the Internet. These texts include not only …

A review of knowledge graph application scenarios in cyber security

K Liu, F Wang, Z Ding, S Liang, Z Yu, Y Zhou - arXiv preprint arXiv …, 2022 - arxiv.org
Facing the dynamic complex cyber environments, internal and external cyber threat
intelligence, and the increasing risk of cyber-attack, knowledge graphs show great …