Feature Representation Models for Cyber Attack Event Extraction

Author(s):  
Xinying Qiu ◽  
Xiaoxin Lin ◽  
Likun Qiu
2020 ◽  
Vol 21 (1) ◽  
Author(s):  
Lvxing Zhu ◽  
Haoran Zheng

Abstract Background Biomedical event extraction is a fundamental and in-demand technology that has attracted substantial interest from many researchers. Previous works have heavily relied on manual designed features and external NLP packages in which the feature engineering is large and complex. Additionally, most of the existing works use the pipeline process that breaks down a task into simple sub-tasks but ignores the interaction between them. To overcome these limitations, we propose a novel event combination strategy based on hybrid deep neural networks to settle the task in a joint end-to-end manner. Results We adapted our method to several annotated corpora of biomedical event extraction tasks. Our method achieved state-of-the-art performance with noticeable overall F1 score improvement compared to that of existing methods for all of these corpora. Conclusions The experimental results demonstrated that our method is effective for biomedical event extraction. The combination strategy can reconstruct complex events from the output of deep neural networks, while the deep neural networks effectively capture the feature representation from the raw text. The biomedical event extraction implementation is available online at http://www.predictor.xin/event_extraction.


2019 ◽  
pp. 73-81
Author(s):  
Oleh Poshedin

The purpose of the article is to describe the changes NATO undergoing in response to the challenges of our time. Today NATO, as a key element of European and Euro-Atlantic security, is adapting to changes in the modern security environment by increasing its readiness and ability to respond to any threat. Adaptation measures include the components required to ensure that the Alliance can fully address the security challenges it might face. Responsiveness NATO Response Force enhanced by developing force packages that are able to move rapidly and respond to potential challenges and threats. As part of it, was established a Very High Readiness Joint Task Force, a new Allied joint force that deploy within a few days to respond to challenges that arise, particularly at the periphery of NATO’s territory. NATO emphasizes, that cyber defence is part of NATO’s core task of collective defence. A decision as to when a cyber attack would lead to the invocation of Article 5 would be taken by the North Atlantic Council on a case-by-case basis. Cooperation with NATO already contributes to the implementation of national security and defense in state policy. At the same time, taking into account that all decision-making in NATO based on consensus, Ukraine’s membership in the Alliance quite vague perspective. In such circumstances, in Ukraine you often can hear the idea of announcement of a neutral status. It is worth reminding that non-aligned status did not save Ukraine from Russian aggression. Neutral status will not accomplish it either. All talks about neutrality and the impossibility of Ukraine joining NATO are nothing but manipulations, as well as recognition of the Ukrainian territory as Russian Federation area of influence (this country seeks to sabotage the Euro-Atlantic movement of Ukraine). Think about it, Moldova’s Neutrality is enshrined in the country’s Constitution since 1994. However, this did not help Moldova to restore its territorial integrity and to force Russia to withdraw its troops and armaments from Transnistria.


2012 ◽  
Vol 132 (6) ◽  
pp. 344-348 ◽  
Author(s):  
Hideaki KOBAYASHI ◽  
Isao KAINE ◽  
Shunsuke TANIGUCHI
Keyword(s):  

2019 ◽  
Vol 7 (1) ◽  
pp. 14-26
Author(s):  
Ruti Gafni ◽  
Tal Pavel

Small and Medium Businesses (SMB) use Internet and computer-based tools in their daily processes, sometimes without being aware to the cyber threats, or without knowing how to be prepared in case of a cyber-attack, although they are a major target for cyber-attacks. Specific information about cybersecurity needed by SMBs, in order to cope with cyber threats, is not always available or easily accessible. In this study, a vast search of different types of information about SMBs’ cybersecurity was performed, in order to find whether a hole of accessible information exists in this area. This exploratory research covered general mass communication media channels, technological and professional cybersecurity websites, and academic journals, and found that indeed very few studies, articles and news items were published in this matter. Leveraging knowledge and awareness, diminishing the shame for reporting cyber-attacks, and increasing mass communication media interest and public attention, may be activities to cover this “invisible hole”.


2003 ◽  
Author(s):  
David A. Wheeler ◽  
Gregory N. Larsen

2011 ◽  
Author(s):  
David M. Keely
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document