عرض بسيط للتسجيلة

المؤلفGasmi H.
المؤلفLaval J.
المؤلفBouras A.
تاريخ الإتاحة2020-04-09T07:35:03Z
تاريخ النشر2019
اسم المنشورApplied Sciences (Switzerland)
المصدرScopus
الرقم المعياري الدولي للكتاب20763417
معرّف المصادر الموحدhttp://dx.doi.org/10.3390/app9193945
معرّف المصادر الموحدhttp://hdl.handle.net/10576/13961
الملخصExtracting cybersecurity entities and the relationships between them from online textual resources such as articles, bulletins, and blogs and converting these resources into more structured and formal representations has important applications in cybersecurity research and is valuable for professional practitioners. Previous works to accomplish this task were mainly based on utilizing feature-based models. Feature-based models are time-consuming and need labor-intensive feature engineering to describe the properties of entities, domain knowledge, entity context, and linguistic characteristics. Therefore, to alleviate the need for feature engineering, we propose the usage of neural network models, specifically the long short-term memory (LSTM) models to accomplish the tasks of Named Entity Recognition (NER) and Relation Extraction (RE).We evaluated the proposed models on two tasks. The first task is performing NER and evaluating the results against the state-of-the-art Conditional Random Fields (CRFs) method. The second task is performing RE using three LSTM models and comparing their results to assess which model is more suitable for the domain of cybersecurity. The proposed models achieved competitive performance with less feature-engineering work. We demonstrate that exploiting neural network models in cybersecurity text mining is effective and practical. - 2019 by the authors.
راعي المشروعThis publication was made possible by the support of Qatar University and DISP laboratory (Lumi?re University Lyon 2, France).
اللغةen
الناشرMDPI AG
الموضوعCybersecurity text
Information extraction
LSTM
Named entity recognition
NLP
Recurrent neural networks
Relation extraction
العنوانInformation extraction of cybersecurity concepts: An LSTM approach
النوعArticle
رقم العدد19
رقم المجلد9


الملفات في هذه التسجيلة

Thumbnail

هذه التسجيلة تظهر في المجموعات التالية

عرض بسيط للتسجيلة