A survey on cybersecurity knowledge graph construction

X Zhao, R Jiang, Y Han, A Li, Z Peng - Computers & Security, 2024 - Elsevier
The development of key technologies of knowledge graph (KG) has promoted the
development of machine cognition technology, and the combination of KG and industry as …

A review on cyber security named entity recognition

C Gao, X Zhang, M Han, H Liu - Frontiers of Information Technology & …, 2021 - Springer
With the rapid development of Internet technology and the advent of the era of big data,
more and more cyber security texts are provided on the Internet. These texts include not only …

[HTML][HTML] A survey on Named Entity Recognition—datasets, tools, and methodologies

B Jehangir, S Radhakrishnan, R Agarwal - Natural Language Processing …, 2023 - Elsevier
Natural language processing (NLP) is crucial in the current processing of data because it
takes into account many sources, formats, and purposes of data as well as information from …

Creating cybersecurity knowledge graphs from malware after action reports

A Piplai, S Mittal, A Joshi, T Finin, J Holt, R Zak - IEEE Access, 2020 - ieeexplore.ieee.org
After Action Reports (AARs) provide incisive analysis of cyber-incidents. Extracting cyber-
knowledge from these sources would provide security analysts with credible information …

“FabNER”: information extraction from manufacturing process science domain literature using named entity recognition

A Kumar, B Starly - Journal of Intelligent Manufacturing, 2022 - Springer
The number of published manufacturing science digital articles available from scientific
journals and the broader web have exponentially increased every year since the 1990s. To …

Automatic extraction of named entities of cyber threats using a deep Bi-LSTM-CRF network

G Kim, C Lee, J Jo, H Lim - International journal of machine learning and …, 2020 - Springer
Countless cyber threat intelligence (CTI) reports are used by companies around the world
on a daily basis for security reasons. To secure critical cybersecurity information, analysts …

Data and knowledge-driven named entity recognition for cyber security

C Gao, X Zhang, H Liu - Cybersecurity, 2021 - Springer
Abstract Named Entity Recognition (NER) for cyber security aims to identify and classify
cyber security terms from a large number of heterogeneous multisource cyber security texts …

Using bert and augmentation in named entity recognition for cybersecurity domain

M Tikhomirov, N Loukachevitch, A Sirotina… - … and Information Systems …, 2020 - Springer
The paper presents the results of applying the BERT representation model in the named
entity recognition task for the cybersecurity domain in Russian. Several variants of the model …

Named entity recognition using BERT with whole world masking in cybersecurity domain

S Zhou, J Liu, X Zhong, W Zhao - 2021 IEEE 6th international …, 2021 - ieeexplore.ieee.org
Nowadays the amount of cybersecurity data grows quickly on the Internet, however most of
them are textual unstructured data, which is hard for security analysis to understand in time …

Study of word embeddings for enhanced cyber security named entity recognition

S Srivastava, B Paul, D Gupta - Procedia Computer Science, 2023 - Elsevier
A vast majority of cyber security information is in the form of unstructured text. A much-
needed task is to have a machine-assisted analysis of such information. Named Entity …