Jiang et al., 2021 - Google Patents
Tapchain: A rule chain recognition model based on multiple featuresJiang et al., 2021
View PDF- Document ID
- 14060650567115915497
- Author
- Jiang K
- Zhang H
- Zhang W
- Fang L
- Ge C
- Yuan Y
- Liu Z
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
Trigger‐action programming (TAP) is an intelligent tool, which makes it easy for users to make intelligent rules for IoT devices and applications. Unfortunately, with the popularization of TAP and more and more rules, the rule chain from multiple rules appears gradually and …
- 238000004458 analytical method 0 abstract description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/27—Automatic analysis, e.g. parsing
- G06F17/2765—Recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN112131882A (en) | Multi-source heterogeneous network security knowledge graph construction method and device | |
| Shen et al. | Data‐Driven Cybersecurity Knowledge Graph Construction for Industrial Control System Security | |
| Zhang et al. | EX‐Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning | |
| US11580222B2 (en) | Automated malware analysis that automatically clusters sandbox reports of similar malware samples | |
| CN115757837B (en) | Confidence evaluation method and device for knowledge graph, electronic equipment and medium | |
| CN111931935B (en) | One-shot learning-based network security knowledge extraction method and device | |
| US12198030B1 (en) | Validating vector constraints of outputs generated by machine learning models | |
| CN112417887A (en) | Sensitive word and sentence recognition model processing method and related equipment thereof | |
| Dong et al. | A sentence-level text adversarial attack algorithm against IIoT based smart grid | |
| Zhang et al. | Multifeature named entity recognition in information security based on adversarial learning | |
| Aghaei et al. | Automated cve analysis for threat prioritization and impact prediction | |
| Chen et al. | A management knowledge graph approach for critical infrastructure protection: Ontology design, information extraction and relation prediction | |
| Mei et al. | “Not Aligned” is Not “Malicious”: Being Careful about Hallucinations of Large Language Models’ Jailbreak | |
| Mostafa et al. | Modality deep-learning frameworks for fake news detection on social networks: A systematic literature review | |
| CN115495744A (en) | Threat information classification method, device, electronic equipment and storage medium | |
| Jiang et al. | Tapchain: A rule chain recognition model based on multiple features | |
| Yu et al. | Heterogeneous Graph Convolutional Network‐Based Dynamic Rumor Detection on Social Media | |
| CN115129896B (en) | Network security emergency response knowledge graph relation extraction method based on comparison learning | |
| CN119886118B (en) | Artificial intelligence-based human resource information text error correction method and system | |
| KR20240013640A (en) | Method for detecting harmful url | |
| CN117009832A (en) | Abnormal command detection methods, devices, electronic equipment and storage media | |
| Hooda et al. | Policylr: A logic representation for privacy policies | |
| Cheng et al. | Debertaic: a framework for cyber threat analysis integrating deberta model and attack intelligence chain | |
| Permana et al. | An enhanced method with part of speech tagging and named entity recognition techniques towards advanced persistent threat in cyber threat intelligence: work in progress | |
| Shafee et al. | False alarms, real damage: Adversarial attacks using LLM-based models on text-based cyber threat intelligence systems |