Doctor of PhilosophyDepartment of Computer ScienceWilliam H HsuThis research develops learning representations and architectures for natural language understanding, within an information mining framework for analysis of open-source cyber threat intelligence (CTI). Both contextual (sequential) and topological (graph-based) encodings of short text documents are modeled. To accomplish this goal, a series of machine learning tasks are defined, and learning representations are developed to detect crucial information in these documents: cyber threat entities, types, and events. Using hybrid transformer-based implementations of these learning models, CTI-relevant key phrases are identified, and specific cyber threats are classified using classific...
abstract: There currently exist various challenges in learning cybersecuirty knowledge, along with a...
Information on cyber-related crimes, incidents, and conflicts is abundantly available in numerous op...
Extracting cybersecurity entities such as attackers and vulnerabilities from unstructured network te...
Doctor of PhilosophyDepartment of Computer ScienceWilliam H HsuThis research develops learning repre...
Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attac...
In the digital era, threat actors employ sophisticated techniques for which, often, digital traces i...
Cyber threat intelligence (CTI) is an actionable information or insight an organization uses to unde...
Instant analysis of cybersecurity reports is a fundamental challenge for security experts as an imme...
The rise in web and social media interactions has resulted in the efortless proliferation of offensi...
This research addresses the question of whether the AI technologies of Natural Language Processing (...
Instant analysis of cybersecurity reports is a fundamental challenge for security experts as an imme...
Machine learning and natural language processing (NLP) can help describe and make inferences on the ...
With exponential growth of the Internet, more than one exabyte of data is cre- ated on the Internet ...
Cyber security has become a major concern for users and businesses alike. Cyberstalking and harassme...
The use of more sophisticated tools and methods from cyber criminals has urged the cyber security co...
abstract: There currently exist various challenges in learning cybersecuirty knowledge, along with a...
Information on cyber-related crimes, incidents, and conflicts is abundantly available in numerous op...
Extracting cybersecurity entities such as attackers and vulnerabilities from unstructured network te...
Doctor of PhilosophyDepartment of Computer ScienceWilliam H HsuThis research develops learning repre...
Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attac...
In the digital era, threat actors employ sophisticated techniques for which, often, digital traces i...
Cyber threat intelligence (CTI) is an actionable information or insight an organization uses to unde...
Instant analysis of cybersecurity reports is a fundamental challenge for security experts as an imme...
The rise in web and social media interactions has resulted in the efortless proliferation of offensi...
This research addresses the question of whether the AI technologies of Natural Language Processing (...
Instant analysis of cybersecurity reports is a fundamental challenge for security experts as an imme...
Machine learning and natural language processing (NLP) can help describe and make inferences on the ...
With exponential growth of the Internet, more than one exabyte of data is cre- ated on the Internet ...
Cyber security has become a major concern for users and businesses alike. Cyberstalking and harassme...
The use of more sophisticated tools and methods from cyber criminals has urged the cyber security co...
abstract: There currently exist various challenges in learning cybersecuirty knowledge, along with a...
Information on cyber-related crimes, incidents, and conflicts is abundantly available in numerous op...
Extracting cybersecurity entities such as attackers and vulnerabilities from unstructured network te...