TAGraph: Knowledge Graph of Threat Actor
暂无分享,去创建一个
Anazida Zainal | Mohd Aizaini Maarof | Mohamad Nizam Kassim | M. A. Maarof | Eric Khoo Jiun Hooi | A. Zainal
[1] Ankur Padia,et al. UCO: A Unified Cybersecurity Ontology , 2016, AAAI Workshop: Artificial Intelligence for Cyber Security.
[2] Imed Zitouni,et al. Natural Language Processing of Semitic Languages , 2014, Theory and Applications of Natural Language Processing.
[3] Beth M. Sundheim,et al. Overview of Results of the MUC-6 Evaluation , 1995, MUC.
[4] Timothy W. Finin,et al. Extracting Cybersecurity Related Linked Data from Text , 2013, 2013 IEEE Seventh International Conference on Semantic Computing.
[5] Wei Li,et al. Early results for Named Entity Recognition with Conditional Random Fields, Feature Induction and Web-Enhanced Lexicons , 2003, CoNLL.
[6] Douglas B. Lenat,et al. CYC: a large-scale investment in knowledge infrastructure , 1995, CACM.
[7] Yorick Wilks,et al. University of Sheffield: description of the LaSIE system as used for MUC-6 , 1995, MUC.
[8] Erik F. Tjong Kim Sang,et al. Introduction to the CoNLL-2003 Shared Task: Language-Independent Named Entity Recognition , 2003, CoNLL.
[9] Douglas E. Appelt,et al. SRI International FASTUS SystemMUC-6 Test Results and Analysis , 1995, MUC.
[10] Estevam R. Hruschka,et al. Coupled semi-supervised learning for information extraction , 2010, WSDM '10.
[11] Praveen Paritosh,et al. Freebase: a collaboratively created graph database for structuring human knowledge , 2008, SIGMOD Conference.
[12] Anupam Joshi,et al. Modeling Computer Attacks: An Ontology for Intrusion Detection , 2003, RAID.
[13] Jens Lehmann,et al. DBpedia - A large-scale, multilingual knowledge base extracted from Wikipedia , 2015, Semantic Web.