Automatic extraction of named entities of cyber threats using a deep Bi-LSTM-CRF network.
Gyeongmin KimChanhee LeeJaechoon JoHeuiseok LimPublished in: Int. J. Mach. Learn. Cybern. (2020)
Keyphrases
- automatic extraction
- relation extraction
- named entities
- named entity recognition
- information extraction
- named entity extraction
- conditional random fields
- cyber security
- co occurrence
- annotated corpus
- cyber attacks
- text mining
- natural language processing
- natural language text
- question answering
- cyber crime
- recurrent neural networks
- text documents
- unsupervised learning
- domain specific
- text corpus
- personal names
- databases
- knowledge discovery
- pairwise
- expert systems
- computer vision