Cyber Threat Intelligence (CTI), which is knowledge of cyberspace threats gathered from security data, is critical in defending against cyberattacks.However, there is no open-source CTI dataset for security researchers to effectively apply enormous CTI information for security analysis in the field of threat intelligence, particularly in the field of Chinese threat intelligence. As a result, for network security research and development, this paper constructed a Chinese CTI entity relationship dataset–CDTier, which includes: 1) A threat entity extraction dataset composed of 100 CTI reports, 3744 threat sentences and 4259 threat knowledge objects; 2) A dataset for entity relation extraction including 100 CTI reports, 2598 threat sentences an...
Cyber Threat Intelligence (CTI) is a new but promising field of information security, with many orga...
With the increasing complexity of network attacks, an active defense based on intelligence sharing b...
Part 4: Novel ApplicationsInternational audienceThreat intelligence is vital to implementing cyber s...
Cyber Threat Intelligence (CTI), which is knowledge of cyberspace threats gathered from security dat...
The cyber threat intelligence (CTI) knowledge graph is beneficial for making robust defense strategi...
Cyber threat intelligence (CTI) sharing has gradually become an important means of dealing with secu...
The increasing number of cyberattacks has made the cybersecurity situation more serious. Thus, it is...
Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attac...
In the digital era, threat actors employ sophisticated techniques for which, often, digital traces i...
The threat landscape and the associated number of IT security incidents are constantly increasing. I...
Relation extraction in the threat intelligence domain plays an important role in mining the internal...
Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeg...
Threat intelligence is the provision of evidence-based knowledge about existing or potential threats...
In data-driven big data security analysis, knowledge graph-based multisource heterogeneous threat da...
Today threat landscape evolving at the rapid rate with much organization continuously face complex a...
Cyber Threat Intelligence (CTI) is a new but promising field of information security, with many orga...
With the increasing complexity of network attacks, an active defense based on intelligence sharing b...
Part 4: Novel ApplicationsInternational audienceThreat intelligence is vital to implementing cyber s...
Cyber Threat Intelligence (CTI), which is knowledge of cyberspace threats gathered from security dat...
The cyber threat intelligence (CTI) knowledge graph is beneficial for making robust defense strategi...
Cyber threat intelligence (CTI) sharing has gradually become an important means of dealing with secu...
The increasing number of cyberattacks has made the cybersecurity situation more serious. Thus, it is...
Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attac...
In the digital era, threat actors employ sophisticated techniques for which, often, digital traces i...
The threat landscape and the associated number of IT security incidents are constantly increasing. I...
Relation extraction in the threat intelligence domain plays an important role in mining the internal...
Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeg...
Threat intelligence is the provision of evidence-based knowledge about existing or potential threats...
In data-driven big data security analysis, knowledge graph-based multisource heterogeneous threat da...
Today threat landscape evolving at the rapid rate with much organization continuously face complex a...
Cyber Threat Intelligence (CTI) is a new but promising field of information security, with many orga...
With the increasing complexity of network attacks, an active defense based on intelligence sharing b...
Part 4: Novel ApplicationsInternational audienceThreat intelligence is vital to implementing cyber s...