Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network
Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in...
Saved in:
| Main Authors: | Weicheng QIU, Xiuzhen CHEN, Yinghua MA, Jin MA, Zhihong ZHOU |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
POSTS&TELECOM PRESS Co., LTD
2023-08-01
|
| Series: | 网络与信息安全学报 |
| Subjects: | |
| Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023052 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Few-shot traffic classification based on autoencoder and deep graph convolutional networks
by: Shengwei Xu, et al.
Published: (2025-03-01) -
Few-Shot Named Entity Recognition Based on the Collaborative Graph Attention Network
by: Haoran Niu, et al.
Published: (2025-01-01) -
What can knowledge graph do for few-shot named entity recognition
by: Binling Nie, et al.
Published: (2025-08-01) -
Few-shot Named Entity Recognition via encoder and class intervention
by: Long Ding, et al.
Published: (2024-01-01) -
Improving Few-Shot Named Entity Recognition with Causal Interventions
by: Zhen Yang, et al.
Published: (2024-12-01)