2013 12th International Conference on Machine Learning and Applications 2013
DOI: 10.1109/icmla.2013.106
|View full text |Cite
|
Sign up to set email alerts
|

PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-security Concepts

Abstract: Public disclosure of important security information, such as knowledge of vulnerabilities or exploits, often occurs in blogs, tweets, mailing lists, and other online sources significantly before proper classification into structured databases. In order to facilitate timely discovery of such knowledge, we propose a novel semi-supervised learning algorithm, PACE, for identifying and classifying relevant entities in text sources. The main contribution of this paper is an enhancement of the traditional bootstrappi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(16 citation statements)
references
References 7 publications
0
15
0
1
Order By: Relevance
“…Mulwad et al [10] proposed a method to extract vulnerabilities and attacks using Wikitology. McNeil et al [11] proposed a method to extract software names, vulnerability categories, vulnerability effects, and exploit effects. Joshi et al [12] proposed a method to generate a Resource Description Framework (RDF) data, which is automatically processed, from unc 2019 Information Processing Society of Japan structured data.…”
Section: Related Workmentioning
confidence: 99%
“…Mulwad et al [10] proposed a method to extract vulnerabilities and attacks using Wikitology. McNeil et al [11] proposed a method to extract software names, vulnerability categories, vulnerability effects, and exploit effects. Joshi et al [12] proposed a method to generate a Resource Description Framework (RDF) data, which is automatically processed, from unc 2019 Information Processing Society of Japan structured data.…”
Section: Related Workmentioning
confidence: 99%
“…There is also ongoing work to incorporate data from unstructured text sources, through a similar process [5,15,10]. This text processing also relies directly on the ontology to define the entities, relations, and properties that must be extracted from these texts.…”
Section: Data Sourcesmentioning
confidence: 99%
“…There is some research work providing evidence that relevant and timely cybersecurity data is available on Twitter [32,41,44], specifically that some vulnerabilities were published on Twitter before their inclusion on vulnerability databases. However, these are case studies concerning a single vulnerability, and compare the tweets referring them solely with the NVD.…”
Section: Cybersecurity-related Osint Studiesmentioning
confidence: 99%