Relation extraction in the threat intelligence domain plays an important role in mining the internal association between crucial threat elements and constructing a knowledge graph (KG). This study designed a novel document-level relation extraction model, FEDRE-KD, integrating additional features to take full advantage of the information in documents. The study also introduced a teacher–student model, realizing knowledge distillation, to further improve performance. Additionally, a threat intelligence ontology was constructed to standardize the entities and their relationships. To solve the problem of lack of publicly available datasets for threat intelligence, manual annotation was carried out on the documents collected from social blogs, ...
In the wake of recent terrorist atrocities, intelligence experts have commented that failures in det...
The current transformation processes aim at robustly networked forces in order to enable them to exe...
Information on cyber-related crimes, incidents, and conflicts is abundantly available in numerous op...
The increasing number of cyberattacks has made the cybersecurity situation more serious. Thus, it is...
Part 4: Novel ApplicationsInternational audienceThreat intelligence is vital to implementing cyber s...
Cyber Threat Intelligence (CTI), which is knowledge of cyberspace threats gathered from security dat...
The cyber threat intelligence (CTI) knowledge graph is beneficial for making robust defense strategi...
Cyberattack forms are complex and varied, and the detection and prediction of dynamic types of attac...
Cyber threat intelligence (CTI) sharing has gradually become an important means of dealing with secu...
Threat intelligence is the provision of evidence-based knowledge about existing or potential threats...
Knowledge graphs gained popularity in recent years and have been useful for concept visualization an...
Cyber threat intelligence is the provision of evidence-based knowledge about existing or emerging th...
With the increasing complexity of network attacks, an active defense based on intelligence sharing b...
We describe an ontological approach for determining the relevance of documents based on the underlyi...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...
In the wake of recent terrorist atrocities, intelligence experts have commented that failures in det...
The current transformation processes aim at robustly networked forces in order to enable them to exe...
Information on cyber-related crimes, incidents, and conflicts is abundantly available in numerous op...
The increasing number of cyberattacks has made the cybersecurity situation more serious. Thus, it is...
Part 4: Novel ApplicationsInternational audienceThreat intelligence is vital to implementing cyber s...
Cyber Threat Intelligence (CTI), which is knowledge of cyberspace threats gathered from security dat...
The cyber threat intelligence (CTI) knowledge graph is beneficial for making robust defense strategi...
Cyberattack forms are complex and varied, and the detection and prediction of dynamic types of attac...
Cyber threat intelligence (CTI) sharing has gradually become an important means of dealing with secu...
Threat intelligence is the provision of evidence-based knowledge about existing or potential threats...
Knowledge graphs gained popularity in recent years and have been useful for concept visualization an...
Cyber threat intelligence is the provision of evidence-based knowledge about existing or emerging th...
With the increasing complexity of network attacks, an active defense based on intelligence sharing b...
We describe an ontological approach for determining the relevance of documents based on the underlyi...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...
In the wake of recent terrorist atrocities, intelligence experts have commented that failures in det...
The current transformation processes aim at robustly networked forces in order to enable them to exe...
Information on cyber-related crimes, incidents, and conflicts is abundantly available in numerous op...