2020
DOI: 10.1109/access.2020.3027321
|View full text |Cite
|
Sign up to set email alerts
|

Quantifying the Significance and Relevance of Cyber-Security Text Through Textual Similarity and Cyber-Security Knowledge Graph

Abstract: In order to proactively mitigate cyber-security risks, security analysts have to continuously monitor sources of threat information. However, the sheer amount of textual information that needs to be processed is overwhelming, and it requires a great deal of mundane labor to separate the threats from the noise. We propose a novel approach to represent the relevance and significance of the cyber-security text in quantitative numbers. We trained custom Named Entity Recognition (NER) model and constructed a Cybers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…initialize the network, that is, set the SOM network and initialize the initial value of each training parameter [ 10 , 11 ]. The values to be initialized are: the random number that gives the link weight W in the [0,1] interval; determine the initial value of the learning rate n (1) η (o) (0 < η ( ω )< 1); and determine the initial value n ( o ) of the domain n ( t ), where G is the winning neuron; calculate the Euclid distance between the weight vector w = ( w , m ) and the input sample x = ( x 1 , x 2 ,…, x n ), and select the minimum distance to determine the winning neuron [ 12 ].…”
Section: Visualization Of Key Knowledge Points Of Nursing Teaching Ma...mentioning
confidence: 99%
“…initialize the network, that is, set the SOM network and initialize the initial value of each training parameter [ 10 , 11 ]. The values to be initialized are: the random number that gives the link weight W in the [0,1] interval; determine the initial value of the learning rate n (1) η (o) (0 < η ( ω )< 1); and determine the initial value n ( o ) of the domain n ( t ), where G is the winning neuron; calculate the Euclid distance between the weight vector w = ( w , m ) and the input sample x = ( x 1 , x 2 ,…, x n ), and select the minimum distance to determine the winning neuron [ 12 ].…”
Section: Visualization Of Key Knowledge Points Of Nursing Teaching Ma...mentioning
confidence: 99%
“…Multiple points of the AV system are outfitted with the suggested IDS to ensure the safety of all internal and external communications. The IDS can be mounted on top of the CAN bus, where it can process every transmitted message and check for compromised nodes [10]. This helps to detect attacks on the CAN bus and keep it secure.…”
Section: Methodsmentioning
confidence: 99%
“…Researchers have examined the security of the Internet of Things in contexts as varied as the smart home, public transit, healthcare, and wireless sensor networks. In [10], the authors analysed the security of Internet of Things (IoT) gadgets that use wireless protocols like WiFi, NFC, Bluetooth, and Zigbee. The authors of [16] conducted a survey focusing on Internet of Things network attacks.…”
Section: Introductionmentioning
confidence: 99%
“…This mainframe faces various types of problems like viruses, spyware, malware, phishing, spam, scams etc. A virus program damages a computer and replicates itself, usually resulting in data loss [1]. Spyware is a type of malicious code that monitors your Internet activity without your knowledge.…”
Section: Introductionmentioning
confidence: 99%