Fusion of Focal Loss’s cyber threat intelligence entity extraction
Cyber threat intelligence contains a wealth of knowledge of threat behavior.Timely analysis and process of threat intelligence can promote the transformation of defense from passive to active.Nowadays, most threat intelligence that exists in the form of natural language texts contains a large amount...
Saved in:
Main Authors: | Yuanbo GUO, Yongfei LI, Qingli CHEN, Chen FANG, Yangyang HU |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2022-07-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022132/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Various types of cyber threats
by: Luknar Ivana, et al.
Published: (2024-01-01) -
Deep learning for cyber threat detection in IoT networks: A review
by: Alyazia Aldhaheri, et al.
Published: (2024-01-01) -
Quality assessment of cyber threat intelligence knowledge graph based on adaptive joining of embedding model
by: Bin Chen, et al.
Published: (2024-11-01) -
Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space
by: Jian-hua LI
Published: (2016-02-01) -
VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION
by: E. V. Batueva
Published: (2014-06-01)