Author:
Pan Yu,Li Hongmei,Li Wei,Liu Yi,Li Xiang,Zheng Qibin,Qin Wei
Publisher
Springer Nature Singapore
Reference18 articles.
1. Bai, W., Pan, Z., Guo, S., Chen, Z., Xia, S.: MDC-checker: A novel network risk assessment framework for multiple domain conjurations. Comput. Secur. 86(Sep.), 388–401 (2019)
2. Eder, J.S.: Knowledge graph based search system. US (2012)
3. Guo, L., Wen, S., Wang, D., Wang, S., Wang, Q., Liu, H.: Overview of cyber threat intelligence description. In: International Conference on Applications and Techniques in Cyber Security and Intelligence, pp. 343–350. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-79197-1
4. Zhao, H.: Knowledge graph oriented information extraction. Hans J. Data Mining 10(4), 282–302 (2020)
5. Wang, X., Zou, L., Wang, C., Peng, P., Feng, Z.: Research on knowledge graph data management: a survey. J. Softw. 30(7), 2140 (2019)