[go: up one dir, main page]

Jiang et al., 2021 - Google Patents

Tapchain: A rule chain recognition model based on multiple features

Jiang et al., 2021

View PDF @Full View
Document ID
14060650567115915497
Author
Jiang K
Zhang H
Zhang W
Fang L
Ge C
Yuan Y
Liu Z
Publication year
Publication venue
Security and Communication Networks

External Links

Snippet

Trigger‐action programming (TAP) is an intelligent tool, which makes it easy for users to make intelligent rules for IoT devices and applications. Unfortunately, with the popularization of TAP and more and more rules, the rule chain from multiple rules appears gradually and …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/27Automatic analysis, e.g. parsing
    • G06F17/2765Recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/22Manipulating or registering by use of codes, e.g. in sequence of text characters
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computer systems based on specific mathematical models
    • G06N7/005Probabilistic networks

Similar Documents

Publication Publication Date Title
CN112131882A (en) Multi-source heterogeneous network security knowledge graph construction method and device
Shen et al. Data‐Driven Cybersecurity Knowledge Graph Construction for Industrial Control System Security
Zhang et al. EX‐Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning
US11580222B2 (en) Automated malware analysis that automatically clusters sandbox reports of similar malware samples
CN115757837B (en) Confidence evaluation method and device for knowledge graph, electronic equipment and medium
CN111931935B (en) One-shot learning-based network security knowledge extraction method and device
US12198030B1 (en) Validating vector constraints of outputs generated by machine learning models
CN112417887A (en) Sensitive word and sentence recognition model processing method and related equipment thereof
Dong et al. A sentence-level text adversarial attack algorithm against IIoT based smart grid
Zhang et al. Multifeature named entity recognition in information security based on adversarial learning
Aghaei et al. Automated cve analysis for threat prioritization and impact prediction
Chen et al. A management knowledge graph approach for critical infrastructure protection: Ontology design, information extraction and relation prediction
Mei et al. “Not Aligned” is Not “Malicious”: Being Careful about Hallucinations of Large Language Models’ Jailbreak
Mostafa et al. Modality deep-learning frameworks for fake news detection on social networks: A systematic literature review
CN115495744A (en) Threat information classification method, device, electronic equipment and storage medium
Jiang et al. Tapchain: A rule chain recognition model based on multiple features
Yu et al. Heterogeneous Graph Convolutional Network‐Based Dynamic Rumor Detection on Social Media
CN115129896B (en) Network security emergency response knowledge graph relation extraction method based on comparison learning
CN119886118B (en) Artificial intelligence-based human resource information text error correction method and system
KR20240013640A (en) Method for detecting harmful url
CN117009832A (en) Abnormal command detection methods, devices, electronic equipment and storage media
Hooda et al. Policylr: A logic representation for privacy policies
Cheng et al. Debertaic: a framework for cyber threat analysis integrating deberta model and attack intelligence chain
Permana et al. An enhanced method with part of speech tagging and named entity recognition techniques towards advanced persistent threat in cyber threat intelligence: work in progress
Shafee et al. False alarms, real damage: Adversarial attacks using LLM-based models on text-based cyber threat intelligence systems