A survey on cybersecurity knowledge graph construction

X Zhao, R Jiang, Y Han, A Li, Z Peng - Computers & Security, 2024 - Elsevier
The development of key technologies of knowledge graph (KG) has promoted the
development of machine cognition technology, and the combination of KG and industry as …

What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A survey

MR Rahman, RM Hezaveh, L Williams - ACM Computing Surveys, 2023 - dl.acm.org
Cybersecurity researchers have contributed to the automated extraction of CTI from textual
sources, such as threat reports and online articles describing cyberattack strategies …

Cskg4apt: A cybersecurity knowledge graph for advanced persistent threat organization attribution

Y Ren, Y Xiao, Y Zhou, Z Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Open-source cyber threat intelligence (OSCTI) is becoming more influential in obtaining
current network security information. Most studies on cyber threat intelligence (CTI) focus on …

[HTML][HTML] Open-cykg: An open cyber threat intelligence knowledge graph

I Sarhan, M Spruit - Knowledge-Based Systems, 2021 - Elsevier
Instant analysis of cybersecurity reports is a fundamental challenge for security experts as
an immeasurable amount of cyber information is generated on a daily basis, which …

Automatic extraction of named entities of cyber threats using a deep Bi-LSTM-CRF network

G Kim, C Lee, J Jo, H Lim - International journal of machine learning and …, 2020 - Springer
Countless cyber threat intelligence (CTI) reports are used by companies around the world
on a daily basis for security reasons. To secure critical cybersecurity information, analysts …

CTI view: APT threat intelligence analysis system

Y Zhou, Y Tang, M Yi, C Xi, H Lu - Security and Communication …, 2022 - Wiley Online Library
With the development of advanced persistent threat (APT) and the increasingly severe
situation of network security, the strategic defense idea with the concept of “active defense …

Automated event extraction of CVE descriptions

Y Wei, L Bo, X Sun, B Li, T Zhang, C Tao - Information and Software …, 2023 - Elsevier
Context: The dramatically increasing number of vulnerabilities makes manual vulnerability
analysis increasingly more difficult. Automatic extraction of vulnerability information can help …

Cdtier: A Chinese dataset of threat intelligence entity relationships

Y Zhou, Y Ren, M Yi, Y Xiao, Z Tan… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Cyber Threat Intelligence (CTI), which is knowledge of cyberspace threats gathered from
security data, is critical in defending against cyberattacks. However, there is no open-source …

Natural language processing model for automatic analysis of cybersecurity-related documents

TM Georgescu - Symmetry, 2020 - mdpi.com
This paper describes the development and implementation of a natural language
processing model based on machine learning which performs cognitive analysis for …

A comparative study of deep learning based named entity recognition algorithms for cybersecurity

S Dasgupta, A Piplai, A Kotal… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Named Entity Recognition (NER) is important in the cybersecurity domain. It helps
researchers extract cyber threat information from unstructured text sources. The extracted …