Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attacks and is often used as training data for AI-based cyber defense systems such as Cybersecurity Knowledge Graphs (CKG). There is a strong need to develop community-accessible datasets to train existing AI-based cybersecurity pipelines to efficiently and accurately extract meaningful insights from CTI. We have created an initial unstructured CTI corpus from a variety of open sources that we are using to train and test cybersecurity entity models using the spaCy framework and exploring self-learning methods to automatically recognize cybersecurity entities. We also describe methods to apply cybersecurity domain entity linking with existing world...
The continuous increase in sophistication of threat actors over the years has made the use of action...
We present CASIE, a system that extracts information about cybersecurity events from text and popula...
The current state-of-the-art in extracting machine-readable attack behavior graphs from natural lang...
In the digital era, threat actors employ sophisticated techniques for which, often, digital traces i...
Doctor of PhilosophyDepartment of Computer ScienceWilliam H HsuThis research develops learning repre...
Content generation that is both relevant and up to date with the current threats of the target audie...
Cyber Security has been a big concern especially in past one decade where it is witnessed that targe...
Cyber Threat Intelligence (CTI), which is knowledge of cyberspace threats gathered from security dat...
Cyber threat intelligence (CTI) sharing has gradually become an important means of dealing with secu...
Instant analysis of cybersecurity reports is a fundamental challenge for security experts as an imme...
Nowadays, there is an increasing need for cyber security professionals to make use of tools that aut...
Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeg...
Instant analysis of cybersecurity reports is a fundamental challenge for security experts as an imme...
Internally, threat intelligence platforms use structured protocols (such as STIX2 or VERIS) to share...
Extracting cybersecurity entities such as attackers and vulnerabilities from unstructured network te...
The continuous increase in sophistication of threat actors over the years has made the use of action...
We present CASIE, a system that extracts information about cybersecurity events from text and popula...
The current state-of-the-art in extracting machine-readable attack behavior graphs from natural lang...
In the digital era, threat actors employ sophisticated techniques for which, often, digital traces i...
Doctor of PhilosophyDepartment of Computer ScienceWilliam H HsuThis research develops learning repre...
Content generation that is both relevant and up to date with the current threats of the target audie...
Cyber Security has been a big concern especially in past one decade where it is witnessed that targe...
Cyber Threat Intelligence (CTI), which is knowledge of cyberspace threats gathered from security dat...
Cyber threat intelligence (CTI) sharing has gradually become an important means of dealing with secu...
Instant analysis of cybersecurity reports is a fundamental challenge for security experts as an imme...
Nowadays, there is an increasing need for cyber security professionals to make use of tools that aut...
Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeg...
Instant analysis of cybersecurity reports is a fundamental challenge for security experts as an imme...
Internally, threat intelligence platforms use structured protocols (such as STIX2 or VERIS) to share...
Extracting cybersecurity entities such as attackers and vulnerabilities from unstructured network te...
The continuous increase in sophistication of threat actors over the years has made the use of action...
We present CASIE, a system that extracts information about cybersecurity events from text and popula...
The current state-of-the-art in extracting machine-readable attack behavior graphs from natural lang...