[1] |
方滨兴, 顾钊铨, 崔翔 ,等. 人工智能安全[M]. 北京: 电子工业出版社, 2020: 81-84.
|
|
FANG B X , GU Z Q , CUI X ,et al. Artificial intelligence safety and security[M]. Beijing: Publishing House of Electronics Industry, 2020.
|
[2] |
AMIT S . Introducing the knowledge graph[R]. America,Official Blog of Google, 2012.
|
[3] |
秦娅 . 网络安全知识图谱构建关键技术研究[D]. 贵阳:贵州大学, 2019.
|
|
QIN Y . Research on key technologies of network security knowledge graph construction[D]. Guiyang:Guizhou University, 2019.
|
[4] |
JIA Y , QI Y L , SHANG H J ,et al. A practical approach to constructing a knowledge graph for cybersecurity[J]. Engineering, 2018,4(1): 53-60.
|
[5] |
王通, 艾中良, 张先国 . 基于深度学习的威胁情报知识图谱构建技术[J]. 计算机与现代化, 2018,128(12): 21-26.
|
|
WANG T , AI Z L , ZHANG X G . Knowledge graph construction of threat intelligence based on deep learning[J]. Computer and Modernization, 2018,128(12): 21-26.
|
[6] |
IANNACONE M , BOHN S , NAKAMURA G ,et al. Developing an ontology for cyber security knowledge graphs[C]// Proceedings of the 10th Annual Cyber and Information Security Research Conference. 2015: 1-4.
|
[7] |
QAMAR S , ANWAR Z , RAHMAN M A ,et al. Data-driven analytics for cyber-threat intelligence and information sharing[J]. Computers & Security, 2017,67: 35-58.
|
[8] |
NOEL S , HARLEY E , TAM K H ,et al. CyGraph:graph-based analytics and visualization for cybersecurity[J]. Handbook of Statistics, 2016,35: 117-167.
|
[9] |
MALATRAS A , DEDE G . AI Cybersecurity challenges:threat landscape for artificial intelligence[R]. Greece:European Network and Information Security Agency, 2020.
|
[10] |
CHEN B , LIU Y , ZHENG Y N . Research on ontology-based network security knowledge map[C]// Proceedings of 2018 International Conference on Cloud Computing,Big Data and Blockchain (ICCBB). 2018: 1-7.
|
[11] |
董聪, 姜波, 卢志刚 ,等. 面向网络空间安全情报的知识图谱综述[J]. 信息安全学报, 2020,5(5): 56-76.
|
|
DONG C , JIANG B , LU Z G ,et al. Knowledge graph for cyberspace security intelligence:a survey[J]. Journal of Cyber Security, 2020,5(5): 56-76.
|
[12] |
OASIS cyber threat intelligence (CTI) TC. STIX? version 2.1[EB].
|
[13] |
景慧昀, 魏薇, 周川 ,等. 人工智能安全框架[J]. 计算机科学, 2021,48(7): 1-8.
|
|
JING H Y , WEI W , ZHOU C ,et al. Artificial intelligence security framework[J]. Computer Science, 2021,48(7): 1-8.
|
[14] |
HUANG Z H , XU W , YU K . Bidirectional LSTM-CRF models for sequence tagging[J]. arXiv preprint:arXiv:1508.01991, 2015.
|
[15] |
LI G Z , CHEN X , WANG P ,et al. FastRE:towards fast relation extraction with convolutional encoder and improved cascade binary tagging framework[C]// Proceedings of the 31st International Joint Conference on Artificial Intelligence. 2022: 4201-4208.
|
[16] |
LAMPLE G , BALLESTEROS M , SUBRA-MANIAN S , ,et al. Neural architectures for named entity recognition[J]. arXiv preprint arXiv:1603.01360, 2016.
|
[17] |
DAUPHIN Y N , FAN A , AULI M ,et al. Language modeling with gated convolutional networks[J]. arXiv preprint arXiv:1612.08083, 2017.
|
[18] |
VASWANI A , SHAZEER N , PARMAR N ,et al. Attention is all you need[J]. arXiv preprint arXiv:1706.03762, 2017.
|
[19] |
LIN C C , YEN H C . A new force-directed graph drawing method based on edge-edge repulsion[J]. Journal of Visual Languages &Computing, 2012,23(1): 29-42.
|
[20] |
肖仰华, 徐波, 林欣等 . 知识图谱概念与技术[M]. 北京: 电子工业出版社, 2020.
|
|
XIAO Y H , XU B , LIN X ,et al. Knowledge graph concepts and techniques[M]. Beijing: Publishing House of Electronics Industry, 2020.
|