2016 IEEE/WIC/ACM International Conference on Web Intelligence Workshops (WIW) 2016
DOI: 10.1109/wiw.2016.020
|View full text |Cite
|
Sign up to set email alerts
|

Feature Representation Models for Cyber Attack Event Extraction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…Besides, work [24] concentrated on extracting security components related to malware. Moreover, some existing work [14], [48] conducted a proof-of-concept to demonstrate that their approaches could cover more than one security event type. However, the security detail hidden in the text was not specified, which is hard to facilitate users' further genuine understanding of the security component.…”
Section: Rq1: What Is the Coverage Of Cybersecurity Pragmatics In Ter...mentioning
confidence: 99%
“…Besides, work [24] concentrated on extracting security components related to malware. Moreover, some existing work [14], [48] conducted a proof-of-concept to demonstrate that their approaches could cover more than one security event type. However, the security detail hidden in the text was not specified, which is hard to facilitate users' further genuine understanding of the security component.…”
Section: Rq1: What Is the Coverage Of Cybersecurity Pragmatics In Ter...mentioning
confidence: 99%
“…Finally, ED has been extensively studied in the literature (Liao and Grishman, 2010;Li et al, 2013;Grishman, 2015, 2016e;Chen et al, 2015;Nguyen et al, 2016g;Lu and Nguyen, 2018;Liu et al, 2016bLiu et al, , 2017Hong et al, 2018;Lai et al, 2020b), partly due to the availability of the large evaluation datasets (i.e., the ACE and TAC KBP datasets (Walker et al, 2006;Mitamura et al, 2015) for the general domains, and the BioNLP datasets (Kim et al, 2009) for the biomedical domain). The closest works to our in the cybersecurity domain involve (Qiu et al, 2016) to extract events on Chinese news, (Khandpur et al, 2017) to perform cyberattack detection on Twitter, and (Satyapanich et al, 2019;Satyapanich et al, 2020) to present the CASIE dataset for event extraction. However, these datasets contain less event types and cannot support the document-level information for the models as CySecED.…”
Section: Related Workmentioning
confidence: 99%
“…Kang et al [27] propose a network assessment framework to help cyber defenders better understand the global situation. Qiu et al [28] thoroughly analyze the relevant features of sentences to classify cyber attacks. They also pointed out that the trigger matching method is most suitable for event type detection, and the performance of the embedded word feature model trained with a large corpus is much better than other models.…”
Section: Cyber Threat Event Detectionmentioning
confidence: 99%