[1] |
DALY M K , . Advanced persistent threat[C]// Proceedings of 23rd Large Installation System Administration Conference. Berkeley:USENIX Association, 2009: 1-6.
|
[2] |
MCMILLAN R . Definition:threat intelligence[R]. Garter Research, 2013.
|
[3] |
李涛, 郭渊博, 琚安康 . 融合对抗主动学习的网络安全知识三元组抽取[J]. 通信学报, 2020,41(10): 80-91.
|
|
LI T , GUO Y B , JU A K . Knowledge triple extraction in cybersecurity with adversarial active learning[J]. Journal on Communications, 2020,41(10): 80-91.
|
[4] |
HOHENECKER P , MTUMBUKA F , KOCIJAN V ,et al. Systematic comparison of neural architectures and training approaches for open information extraction[C]// Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP). Stroudsburg:Association for Computational Linguistics, 2020: 8554-8565.
|
[5] |
LIN T Y , GOYAL P , GIRSHICK R ,et al. Focal loss for dense object detection[C]// Proceedings of 2017 IEEE International Conference on Computer Vision. Piscataway:IEEE Press, 2017: 2999-3007.
|
[6] |
LEI J B , TANG B Z , LU X Q ,et al. A comprehensive study of named entity recognition in Chinese clinical text[J]. Journal of the American Medical Informatics Association, 2013,21(5): 808-814.
|
[7] |
刘显敏, 李建中 . 基于键规则的 XML 实体抽取方法[J]. 计算机研究与发展, 2014,51(1): 64-75.
|
|
LIU X M , LI J Z . Key-based method for extracting entities from XML data[J]. Journal of Computer Research and Development, 2014,51(1): 64-75.
|
[8] |
MULWAD V , LI W J , JOSHI A ,et al. Extracting information about security vulnerabilities from web text[C]// Proceedings of 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology. Piscataway:IEEE Press, 2011: 257-260.
|
[9] |
BRIDGES R A , HUFFER K M T , JONES C L ,et al. Cybersecurity automated information extraction techniques:drawbacks of current methods,and enhanced extractors[C]// Proceedings of 2017 16th IEEE International Conference on Machine Learning and Applications. Piscataway:IEEE Press, 2017: 437-442.
|
[10] |
JONES C L , BRIDGES R A , HUFFER K M T ,et al. Towards a relation extraction framework for cyber-security concepts[C]// Proceedings of the 10th Annual Cyber and Information Security Research Conference.[S.l.:s.n.], 2015: 1-4.
|
[11] |
HUANG Z , XU W , YU K . Bidirectional LSTM-CRF models for sequence tagging[J]. arXiv Preprint,arXiv:150801991, 2015.
|
[12] |
SARHAN I , SPRUIT M . Open-CyKG:an open cyber threat intelligence knowledge graph[J]. Knowledge-Based Systems, 2021,233:107524.
|
[13] |
ZHAO J , YAN Q B , LI J X ,et al. TIMiner:automatically extracting and analyzing categorized cyber threat intelligence from social data[J]. Computers & Security, 2020,95:101867.
|
[14] |
GASMI H , LAVAL J , BOURAS A . Information extraction of cybersecurity concepts:an LSTM approach[J]. Applied Sciences, 2019,9(19): 3945.
|
[15] |
王伟平, 宁翔凯, 宋虹 ,等. iAES:面向网络安全博客的 IOC 自动抽取方法[J]. 计算机学报, 2021,44(5): 882-896.
|
|
WANG W P , NING X K , SONG H ,et al. An indicator of compromise extraction method based on deep learning[J]. Chinese Journal of Computers, 2021,44(5): 882-896.
|
[16] |
WU Y M , LIU Q J , LIAO X J ,et al. Price TAG:towards semi-automatically discovery tactics,techniques and procedures of E-commerce cyber threat intelligence[J]. IEEE Transactions on Dependable and Secure Computing, 2021,PP(99): 1.
|
[17] |
MANIKANDAN R , MADGULA K , SAHA S . TeamDL at SemEval 2018 task 8:cybersecurity text analysis using convolutional neural network and conditional random fields[C]// Proceedings of the 12th International Workshop on Semantic Evaluation. Stroudsburg:Association for Computational Linguistics, 2018: 868-873.
|
[18] |
MA X Z , HOVY E . End-to-end sequence labeling via bi-directional LSTM-CNNS-CRF[J]. arXiv Preprint,arXiv:160301354, 2016.
|
[19] |
FU M M , ZHAO X M , YAN Y H . HCCL at SemEval-2018 task 8:an end-to-end system for sequence labeling from cybersecurity reports[C]// Proceedings of the 12th International Workshop on Semantic Evaluation. Stroudsburg:Association for Computational Linguistics, 2018: 874-877.
|
[20] |
CHIU J P C , NICHOLS E . Named entity recognition with bidirectional LSTM-CNNs[J]. arXiv Preprint,arXiv:1511.08308, 2015.
|
[21] |
SANTOS C N D , ZADROZNY B . Learning character-level representations for part-of-speech tagging[C]// Proceedings of International Conference on Machine Learning. New York:ACM Press, 2014: 1818-1826.
|