Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network
Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in...
Saved in:
Main Authors: | Weicheng QIU, Xiuzhen CHEN, Yinghua MA, Jin MA, Zhihong ZHOU |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2023-08-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023052 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A Few-Shot Knowledge Graph Completion Model With Neighbor Filter and Affine Attention
by: Hongfang Gong, et al.
Published: (2025-01-01) -
EMNet: A Novel Few-Shot Image Classification Model with Enhanced Self-Correlation Attention and Multi-Branch Joint Module
by: Fufang Li, et al.
Published: (2025-01-01) -
DSMF-Net: Dual Semantic Metric Learning Fusion Network for Few-Shot Aerial Image Semantic Segmentation
by: Xiyu Qi, et al.
Published: (2025-01-01) -
Design of an integrated model with temporal graph attention and transformer-augmented RNNs for enhanced anomaly detection
by: Sai Babu Veesam, et al.
Published: (2025-01-01) -
Instruction and demonstration-based secure service attribute generation mechanism for textual data
by: LI Chenhao, et al.
Published: (2024-12-01)