A Practical Approach to Constructing a Knowledge Graph for Cybersecurity
Jia, Yan, Qi, Yulu, Shang, Huaijun, Jiang, Rong, Li, Aiping
Published in Engineering (Beijing, China) (01.02.2018)
Published in Engineering (Beijing, China) (01.02.2018)
Get full text
Journal Article
A Framework to Construct Knowledge Base for Cyber Security
Huaijun Shang, Rong Jiang, Aiping Li, Wei Wang
Published in 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC) (01.06.2017)
Published in 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC) (01.06.2017)
Get full text
Conference Proceeding
Neural network-based intrusion detection method
XU JINGHU, YANG XING, MA KAI, LI RUNHENG, YANG SHUQIANG, LIN JIA, AN LUN, JIANG RONG, LI AIPING, JIA YAN, WANG WEI, QI YULU, SHANG HUAIJUN, ZHOU BIN, HAN WEIHONG
Year of Publication 21.09.2018
Get full text
Year of Publication 21.09.2018
Patent
Distributed security event associated analysis method based on knowledge graph
XU JINGHU, YANG XING, LI RUNHENG, MA KAI, YANG SHUQIANG, LIN JIA, AN LUN, JIANG RONG, LI AIPING, JIA YAN, WANG WEI, QI YULU, SHANG HUAIJUN, ZHOU BIN, HAN WEIHONG
Year of Publication 10.07.2018
Get full text
Year of Publication 10.07.2018
Patent
Knowledge base constructing method oriented to network safety
XU JINGHU, YANG XING, LI RUNHENG, MA KAI, YANG SHUQIANG, LIN JIA, AN LUN, JIANG RONG, LI AIPING, JIA YAN, WANG WEI, QI YULU, SHANG HUAIJUN, ZHOU BIN, HAN WEIHONG
Year of Publication 06.07.2018
Get full text
Year of Publication 06.07.2018
Patent