4.5 Article

Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text

Related references

Note: Only part of the references are listed.
Proceedings Paper Computer Science, Artificial Intelligence

Generating Fake Cyber Threat Intelligence Using Transformer-Based Models

Priyanka Ranade et al.

Summary: This paper demonstrates the automatic generation of fake CTI text descriptions using transformers for data poisoning attacks. The attacks result in negative impacts such as incorrect reasoning outputs and disruption of AI-based cyber defense systems.

2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN) (2021)

Article Computer Science, Theory & Methods

GapFinder: Finding Inconsistency of Security Information From Unstructured Text

Hyeonseong Jo et al.

Summary: Textual data mining in the cybersecurity domain is increasingly significant for transforming unstructured web content into structured forms through natural language processing, driving machine learning applications and data indexing services. However, automating the identification of semantic inconsistencies among different text input sources remains an underexplored issue.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Information Systems

TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data

Jun Zhao et al.

COMPUTERS & SECURITY (2020)

Article Multidisciplinary Sciences

Entity Linking via Symmetrical Attention-Based Neural Network and Entity Structural Features

Shengze Hu et al.

SYMMETRY-BASEL (2019)

Article Biochemical Research Methods

Deep learning with word embeddings improves biomedical named entity recognition

Maryam Habibi et al.

BIOINFORMATICS (2017)

Article Computer Science, Artificial Intelligence

Truth discovery with multiple conflicting information providers on the Web

Xiaoxin Yin et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2008)