AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports.
Zhenyuan LiJun ZengYan ChenZhenkai LiangPublished in: ESORICS (1) (2022)
Keyphrases
- knowledge base
- artificial intelligence
- graph structure
- knowledge based systems
- domain knowledge
- knowledge management
- background knowledge
- knowledge discovery
- prior knowledge
- knowledge representation
- data mining techniques
- human beings
- bayesian networks
- knowledge sources
- graph model
- bipartite graph
- knowledge sharing
- cyber crime
- social network analysis
- domain experts
- structured data
- learning systems
- design process
- random walk
- intelligent systems
- image segmentation