2020 International Joint Conference on Neural Networks (IJCNN) 2020
DOI: 10.1109/ijcnn48605.2020.9207140
|View full text |Cite
|
Sign up to set email alerts
|

Learning Word Representation for the Cyber Security Vulnerability Domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 27 publications
0
1
0
Order By: Relevance
“…Natural Language Interfaces (NLIs), such as chatbots and virtual assistants, are central parts of this alignment. These NLIs facilitate smooth communication between humans and machines (Mumtaz et al, 2020). NLIs have become crucial in improving user experiences by offering intuitive and conversational interfaces.…”
Section: Human-centric Ai and Natural Language Interfacesmentioning
confidence: 99%
“…Natural Language Interfaces (NLIs), such as chatbots and virtual assistants, are central parts of this alignment. These NLIs facilitate smooth communication between humans and machines (Mumtaz et al, 2020). NLIs have become crucial in improving user experiences by offering intuitive and conversational interfaces.…”
Section: Human-centric Ai and Natural Language Interfacesmentioning
confidence: 99%
“…Motivated by the large-scale foundational models's successes in many general domain NLP tasks, several domain-specific language models have been developed (Roy et al, 2017(Roy et al, , 2019Mumtaz et al, 2020). In scientific and bio-medical domains, there are SciBERT (Beltagy et al, 2019), Blue-BERT (Peng et al, 2019), ClinicalBERT (Huang et al, 2019), BioBERT (Lee et al, 2020) and Pub-MedBERT (Gu et al, 2022).…”
Section: Related Workmentioning
confidence: 99%
“…They train Word2Vec models using malware descriptions. Similarly, Mumtaz et al (2020) train a Word2Vec model using security vulnerability-related bulletins and Wikipedia pages.…”
Section: Related Workmentioning
confidence: 99%
“…It's also likely that many ethical hackers, like bug bounty hunters, came into the craft the same way [15]. S. Mumtaz et al[2020] propose a word embedding for the cyber security vulnerability domain. They train our embedding model on multiple, rich, and heterogeneous security vulnerability information sources publicly available on the web.…”
Section: Introductionmentioning
confidence: 99%