In data-driven big data security analysis, knowledge graph-based multisource heterogeneous threat data organization, association mining, and inference analysis attach increasinginterest in the field of cybersecurity. Although the construction of knowledge graph based on deep learning has achieved great success, the construction of a largescale, high-quality, and domain-specific knowledge graph needs a manual annotation of large corpora, which means it is very difficult. To tackle this problem, we present a straightforward active learning strategy for cybersecurity entity recognition utilizing deep learning technology. BERT pre-trained model and residual dilation convolutional neural networks (RDCNN) are introduced to learn entity context fe...
Recent years have seen the successful application of deep learning techniques, an enhanced model of ...
The application of cybersecurity knowledge graphs is attracting increasing attention. However, many ...
The continuous increase in sophistication of threat actors over the years has made the use of action...
Part 2: AIInternational audienceWith the continuous development of cybersecurity texts, the importan...
In order to obtain high quality and large-scale labelled data for information security research, we ...
Cyber Threat Intelligence (CTI), which is knowledge of cyberspace threats gathered from security dat...
Cyberattack forms are complex and varied, and the detection and prediction of dynamic types of attac...
Cyber attacks are increasing rapidly due to advanced digital technologies used by hackers. In additi...
With the development of information technology, thousands of devices are connected to the Internet, ...
With the comprehensive promotion of “big data + energy”, new power network security threats are also...
Named entity recognition is an important stage in the construction of knowledge graph. Based on the ...
With the booming of cyber attacks and cyber criminals against cyber-physical systems (CPSs), detecti...
Telecommunication has registered strong and rapid growth in the past decade. Accordingly, the monito...
abstract: There currently exist various challenges in learning cybersecuirty knowledge, along with a...
This research recasts the network attack dataset from UNSW-NB15 as an intrusion detection problem in...
Recent years have seen the successful application of deep learning techniques, an enhanced model of ...
The application of cybersecurity knowledge graphs is attracting increasing attention. However, many ...
The continuous increase in sophistication of threat actors over the years has made the use of action...
Part 2: AIInternational audienceWith the continuous development of cybersecurity texts, the importan...
In order to obtain high quality and large-scale labelled data for information security research, we ...
Cyber Threat Intelligence (CTI), which is knowledge of cyberspace threats gathered from security dat...
Cyberattack forms are complex and varied, and the detection and prediction of dynamic types of attac...
Cyber attacks are increasing rapidly due to advanced digital technologies used by hackers. In additi...
With the development of information technology, thousands of devices are connected to the Internet, ...
With the comprehensive promotion of “big data + energy”, new power network security threats are also...
Named entity recognition is an important stage in the construction of knowledge graph. Based on the ...
With the booming of cyber attacks and cyber criminals against cyber-physical systems (CPSs), detecti...
Telecommunication has registered strong and rapid growth in the past decade. Accordingly, the monito...
abstract: There currently exist various challenges in learning cybersecuirty knowledge, along with a...
This research recasts the network attack dataset from UNSW-NB15 as an intrusion detection problem in...
Recent years have seen the successful application of deep learning techniques, an enhanced model of ...
The application of cybersecurity knowledge graphs is attracting increasing attention. However, many ...
The continuous increase in sophistication of threat actors over the years has made the use of action...