A survey on cybersecurity knowledge graph construction

X Zhao, R Jiang, Y Han, A Li, Z Peng - Computers & Security, 2024 - Elsevier
The development of key technologies of knowledge graph (KG) has promoted the
development of machine cognition technology, and the combination of KG and industry as …

A review on cyber security named entity recognition

C Gao, X Zhang, M Han, H Liu - Frontiers of Information Technology & …, 2021 - Springer
With the rapid development of Internet technology and the advent of the era of big data,
more and more cyber security texts are provided on the Internet. These texts include not only …

A machine learning approach for the NLP-based analysis of cyber threats and vulnerabilities of the healthcare ecosystem

S Silvestri, S Islam, S Papastergiou, C Tzagkarakis… - Sensors, 2023 - mdpi.com
Digitization in healthcare systems, with the wid adoption of Electronic Health Records,
connected medical devices, software and systems providing efficient healthcare service …

Cybert: Cybersecurity claim classification by fine-tuning the bert language model

K Ameri, M Hempel, H Sharif, J Lopez Jr… - Journal of Cybersecurity …, 2021 - mdpi.com
We introduce CyBERT, a cybersecurity feature claims classifier based on bidirectional
encoder representations from transformers and a key component in our semi-automated …

Can BERT dig it? named entity recognition for information retrieval in the archaeology domain

A Brandsen, S Verberne, K Lambers… - Journal on Computing …, 2022 - dl.acm.org
The amount of archaeological literature is growing rapidly. Until recently, these data were
only accessible through metadata search. We implemented a text retrieval engine for a large …

WojoodNER 2024: The Second Arabic Named Entity Recognition Shared Task

M Jarrar, N Hamad, M Khalilia, B Talafha… - arXiv preprint arXiv …, 2024 - arxiv.org
We present WojoodNER-2024, the second Arabic Named Entity Recognition (NER) Shared
Task. In WojoodNER-2024, we focus on fine-grained Arabic NER. We provided participants …

Arabic fine-grained entity recognition

H Liqreina, M Jarrar, M Khalilia, AO El-Shangiti… - arXiv preprint arXiv …, 2023 - arxiv.org
Traditional NER systems are typically trained to recognize coarse-grained entities, and less
attention is given to classifying entities into a hierarchy of fine-grained lower-level subtypes …

Data and knowledge-driven named entity recognition for cyber security

C Gao, X Zhang, H Liu - Cybersecurity, 2021 - Springer
Abstract Named Entity Recognition (NER) for cyber security aims to identify and classify
cyber security terms from a large number of heterogeneous multisource cyber security texts …

Named entity recognition using BERT with whole world masking in cybersecurity domain

S Zhou, J Liu, X Zhong, W Zhao - 2021 IEEE 6th international …, 2021 - ieeexplore.ieee.org
Nowadays the amount of cybersecurity data grows quickly on the Internet, however most of
them are textual unstructured data, which is hard for security analysis to understand in time …

Study of word embeddings for enhanced cyber security named entity recognition

S Srivastava, B Paul, D Gupta - Procedia Computer Science, 2023 - Elsevier
A vast majority of cyber security information is in the form of unstructured text. A much-
needed task is to have a machine-assisted analysis of such information. Named Entity …