Topics

No keywords indexed for this article. Browse by subject →

References
46
[1]
Bridges (2013)
[2]
Multitask Learning

Rich Caruana

Machine Learning 10.1023/a:1007379606734
[3]
Devlin (2018)
[5]
Hidden Markov models

Sean R Eddy

Current Opinion in Structural Biology 10.1016/s0959-440x(96)80056-x
[6]
Gasmi "LSTM recurrent neural networks for cyber security named entity recognition" Proc 13th Int Conf on Software Engineering Advances (2018)
[8]
Gu "Malware name recognition in tweets based on enhanced BiLSTM-CRF model" Comput Sci (2020)
[13]
Lafferty "Conditional random fields: probabilistic models for segmenting and labeling sequence data" Proc 18th Int Conf on Machine Learning (2001)
[14]
Lal (2013)
[15]
Neural Architectures for Named Entity Recognition

Guillaume Lample, Miguel Ballesteros, Sandeep Subramanian et al.

Proceedings of the 2016 Conference of the North Am... 2016 10.18653/v1/n16-1030
[16]
Deep learning

Yann LeCun, Yoshua Bengio, Geoffrey Hinton

Nature 10.1038/nature14539
[17]
Lee "Transfer learning for named-entity recognition with neural networks" Proc 11th Int Conf on Language Resources and Evaluation (2018)
[24]
Mazharov "Named entity recognition for information security domain" Proc 20th Int Conf on Data Analytics and Management in Data Intensive Domains (2018)
[25]
McNeil "PACE: pattern accurate computationally efficient bootstrapping for timely discovery of cyber-security concepts" (2013)
[29]
Peters (2017)
[31]
Riloff "Automatically constructing a dictionary for information extraction tasks" Proc 11th National Conf on Artificial Intelligence (1993)
[32]
Roy (2017)
[33]
Ruder (2016)
[36]
[37]
Syed (2010)
[38]
Syed "UCO: a unified cybersecurity ontology" AAAI Workshop on Artificial Intelligence for Cyber Security (2016)
[46]
Zhou (2018)
Cited By
31
NLP-based techniques for Cyber Threat Intelligence

Marco Arazzi, Dincy R. Arikkat · 2025

Computer Science Review