{"id":"https://openalex.org/W4414409343","doi":"https://doi.org/10.3390/informatics12030100","title":"CyberKG: Constructing a Cybersecurity Knowledge Graph Based on SecureBERT_Plus for CTI Reports","display_name":"CyberKG: Constructing a Cybersecurity Knowledge Graph Based on SecureBERT_Plus for CTI Reports","publication_year":2025,"publication_date":"2025-09-22","ids":{"openalex":"https://openalex.org/W4414409343","doi":"https://doi.org/10.3390/informatics12030100"},"language":"en","primary_location":{"id":"doi:10.3390/informatics12030100","is_oa":true,"landing_page_url":"https://doi.org/10.3390/informatics12030100","pdf_url":"https://www.mdpi.com/2227-9709/12/3/100/pdf?version=1758542142","source":{"id":"https://openalex.org/S2738238905","display_name":"Informatics","issn_l":"2227-9709","issn":["2227-9709"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2227-9709/12/3/100/pdf?version=1758542142","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082955232","display_name":"Binyong Li","orcid":"https://orcid.org/0000-0003-3615-1129"},"institutions":[{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Binyong Li","raw_affiliation_strings":["Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu 610225, China","SUGON Industrial Control and Security Center, Chengdu 610225, China","School of Cybersecurity (Xin Gu Industrial College), Chengdu University of Information Technology, Chengdu 610225, China"],"affiliations":[{"raw_affiliation_string":"Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu 610225, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"SUGON Industrial Control and Security Center, Chengdu 610225, China","institution_ids":[]},{"raw_affiliation_string":"School of Cybersecurity (Xin Gu Industrial College), Chengdu University of Information Technology, Chengdu 610225, China","institution_ids":["https://openalex.org/I24201400"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Qiaoxi Yang","orcid":"https://orcid.org/0009-0001-2326-2594"},"institutions":[{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qiaoxi Yang","raw_affiliation_strings":["School of Cybersecurity (Xin Gu Industrial College), Chengdu University of Information Technology, Chengdu 610225, China"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity (Xin Gu Industrial College), Chengdu University of Information Technology, Chengdu 610225, China","institution_ids":["https://openalex.org/I24201400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101637858","display_name":"Chuang Deng","orcid":"https://orcid.org/0009-0009-9474-5364"},"institutions":[{"id":"https://openalex.org/I17442442","display_name":"State Grid Corporation of China (China)","ror":"https://ror.org/05twwhs70","country_code":"CN","type":"company","lineage":["https://openalex.org/I17442442"]},{"id":"https://openalex.org/I867306930","display_name":"Power Grid Corporation (India)","ror":"https://ror.org/0136vj189","country_code":"IN","type":"company","lineage":["https://openalex.org/I867306930"]}],"countries":["CN","IN"],"is_corresponding":false,"raw_author_name":"Chuang Deng","raw_affiliation_strings":["Center for Power Emergency Management, State Grid Sichuan Electric Power Corporation, Chengdu 610041, China"],"affiliations":[{"raw_affiliation_string":"Center for Power Emergency Management, State Grid Sichuan Electric Power Corporation, Chengdu 610041, China","institution_ids":["https://openalex.org/I17442442","https://openalex.org/I867306930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110850416","display_name":"Hua Pan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210097660","display_name":"Guangxi Science and Technology Department","ror":"https://ror.org/00dhpdx54","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210097660"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hua Pan","raw_affiliation_strings":["Guangxi Beitou Innovation Technology Investment Group Co., Ltd., Nanning 530029, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Beitou Innovation Technology Investment Group Co., Ltd., Nanning 530029, China","institution_ids":["https://openalex.org/I4210097660"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I24201400"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":3.8737,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.94144606,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"12","issue":"3","first_page":"100","last_page":"100"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/knowledge-graph","display_name":"Knowledge graph","score":0.7063000202178955},{"id":"https://openalex.org/keywords/entity-linking","display_name":"Entity linking","score":0.5238999724388123},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5008000135421753},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.49729999899864197},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.45080000162124634},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.44609999656677246},{"id":"https://openalex.org/keywords/dependency-graph","display_name":"Dependency graph","score":0.3901999890804291},{"id":"https://openalex.org/keywords/knowledge-base","display_name":"Knowledge base","score":0.3804999887943268},{"id":"https://openalex.org/keywords/relationship-extraction","display_name":"Relationship extraction","score":0.3765999972820282}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7875000238418579},{"id":"https://openalex.org/C2987255567","wikidata":"https://www.wikidata.org/wiki/Q33002955","display_name":"Knowledge graph","level":2,"score":0.7063000202178955},{"id":"https://openalex.org/C96711827","wikidata":"https://www.wikidata.org/wiki/Q17012245","display_name":"Entity linking","level":3,"score":0.5238999724388123},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5008000135421753},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.49729999899864197},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.45080000162124634},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.44609999656677246},{"id":"https://openalex.org/C16311509","wikidata":"https://www.wikidata.org/wiki/Q4148050","display_name":"Dependency graph","level":3,"score":0.3901999890804291},{"id":"https://openalex.org/C4554734","wikidata":"https://www.wikidata.org/wiki/Q593744","display_name":"Knowledge base","level":2,"score":0.3804999887943268},{"id":"https://openalex.org/C153604712","wikidata":"https://www.wikidata.org/wiki/Q7310755","display_name":"Relationship extraction","level":3,"score":0.3765999972820282},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.365200012922287},{"id":"https://openalex.org/C161301231","wikidata":"https://www.wikidata.org/wiki/Q3478658","display_name":"Knowledge representation and reasoning","level":2,"score":0.35910001397132874},{"id":"https://openalex.org/C120567893","wikidata":"https://www.wikidata.org/wiki/Q1582085","display_name":"Knowledge extraction","level":2,"score":0.3411000072956085},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33390000462532043},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.33379998803138733},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.32710000872612},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.323199987411499},{"id":"https://openalex.org/C18555067","wikidata":"https://www.wikidata.org/wiki/Q8375051","display_name":"Joint (building)","level":2,"score":0.3206999897956848},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.310699999332428},{"id":"https://openalex.org/C195807954","wikidata":"https://www.wikidata.org/wiki/Q1662562","display_name":"Information extraction","level":2,"score":0.3093999922275543},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3050000071525574},{"id":"https://openalex.org/C72634772","wikidata":"https://www.wikidata.org/wiki/Q386824","display_name":"Data integration","level":2,"score":0.30469998717308044},{"id":"https://openalex.org/C6881194","wikidata":"https://www.wikidata.org/wiki/Q7449091","display_name":"Semantic technology","level":4,"score":0.2944999933242798},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.2833999991416931},{"id":"https://openalex.org/C115925183","wikidata":"https://www.wikidata.org/wiki/Q1412694","display_name":"Knowledge-based systems","level":2,"score":0.27970001101493835},{"id":"https://openalex.org/C92835128","wikidata":"https://www.wikidata.org/wiki/Q1277447","display_name":"Hierarchical clustering","level":3,"score":0.2791999876499176},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.27250000834465027},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.26930001378059387},{"id":"https://openalex.org/C2779135771","wikidata":"https://www.wikidata.org/wiki/Q403574","display_name":"Named-entity recognition","level":3,"score":0.26460000872612},{"id":"https://openalex.org/C90312973","wikidata":"https://www.wikidata.org/wiki/Q7449052","display_name":"Semantic data model","level":2,"score":0.2606000006198883},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2549999952316284},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.2540999948978424},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.2540000081062317}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/informatics12030100","is_oa":true,"landing_page_url":"https://doi.org/10.3390/informatics12030100","pdf_url":"https://www.mdpi.com/2227-9709/12/3/100/pdf?version=1758542142","source":{"id":"https://openalex.org/S2738238905","display_name":"Informatics","issn_l":"2227-9709","issn":["2227-9709"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatics","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:e7e976e0488c4a779e9d9c840bcd0d27","is_oa":true,"landing_page_url":"https://doaj.org/article/e7e976e0488c4a779e9d9c840bcd0d27","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Informatics, Vol 12, Iss 3, p 100 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/informatics12030100","is_oa":true,"landing_page_url":"https://doi.org/10.3390/informatics12030100","pdf_url":"https://www.mdpi.com/2227-9709/12/3/100/pdf?version=1758542142","source":{"id":"https://openalex.org/S2738238905","display_name":"Informatics","issn_l":"2227-9709","issn":["2227-9709"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatics","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4414409343.pdf","grobid_xml":"https://content.openalex.org/works/W4414409343.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W2587809655","https://openalex.org/W2913350960","https://openalex.org/W2963997908","https://openalex.org/W2971902095","https://openalex.org/W3004611733","https://openalex.org/W3023882301","https://openalex.org/W3089797352","https://openalex.org/W3131634850","https://openalex.org/W3131901903","https://openalex.org/W3185233965","https://openalex.org/W3198980504","https://openalex.org/W3207365242","https://openalex.org/W3214329506","https://openalex.org/W4205199446","https://openalex.org/W4224224716","https://openalex.org/W4281381644","https://openalex.org/W4286375281","https://openalex.org/W4296606109","https://openalex.org/W4298152069","https://openalex.org/W4318570535","https://openalex.org/W4319079731","https://openalex.org/W4321375351","https://openalex.org/W4362468168","https://openalex.org/W4382405221","https://openalex.org/W4386516837","https://openalex.org/W4388441710","https://openalex.org/W4389519408","https://openalex.org/W4391263122","https://openalex.org/W4392849751","https://openalex.org/W4393253320","https://openalex.org/W4402644087"],"related_works":[],"abstract_inverted_index":{"Cyberattacks,":[0],"especially":[1],"Advanced":[2],"Persistent":[3],"Threats":[4],"(APTs),":[5],"have":[6],"become":[7],"more":[8],"complex.":[9],"These":[10],"evolving":[11],"threats":[12],"challenge":[13],"traditional":[14],"defense":[15,158],"systems,":[16],"which":[17,72],"struggle":[18],"to":[19],"counter":[20],"long-lasting":[21],"and":[22,57,76,123,131,142],"covert":[23],"attacks.":[24],"Cybersecurity":[25],"Knowledge":[26],"Graphs":[27],"(CKGs),":[28],"enabled":[29],"through":[30,98],"the":[31,69,129,143],"integration":[32],"of":[33,145],"multi-source":[34],"CTI,":[35],"introduce":[36],"novel":[37],"approaches":[38],"for":[39],"proactive":[40,157],"defense.":[41],"However,":[42],"building":[43],"CKGs":[44],"faces":[45],"challenges":[46],"such":[47],"as":[48],"unclear":[49],"terminology,":[50],"overlapping":[51,146],"entity":[52,74,121,140],"relationships":[53],"in":[54,59,137],"attack":[55],"chains,":[56],"differences":[58],"CTI":[60],"across":[61],"sources.":[62],"To":[63],"tackle":[64],"these":[65],"challenges,":[66],"we":[67],"propose":[68],"CyberKG":[70],"framework,":[71],"improves":[73],"recognition":[75],"relation":[77],"extraction":[78,138],"using":[79,88],"a":[80,89],"SecureBERT_Plus-BiLSTM-Attention-CRF":[81],"joint":[82],"architecture.":[83],"Semantic":[84],"features":[85],"are":[86,96],"captured":[87],"domain-adapted":[90],"SecureBERT_Plus":[91],"model,":[92],"while":[93,106],"temporal":[94],"dependencies":[95],"modeled":[97],"BiLSTM.":[99],"Attention":[100],"mechanisms":[101],"highlight":[102],"key":[103],"cross-sentence":[104],"relationships,":[105],"CRF":[107],"incorporates":[108],"ATT&amp;CK":[109],"rule":[110],"constraints.":[111],"Hierarchical":[112],"clustering":[113],"(HAC),":[114],"based":[115],"on":[116,128],"contextual":[117],"embeddings,":[118],"facilitates":[119],"dynamic":[120],"disambiguation":[122],"semantic":[124],"fusion.":[125],"Experimental":[126],"evaluations":[127],"DNRTI":[130],"MalwareDB":[132],"datasets":[133],"demonstrate":[134],"strong":[135],"performance":[136],"accuracy,":[139],"normalization,":[141],"resolution":[144],"relations.":[147],"The":[148],"constructed":[149],"knowledge":[150],"graph":[151],"supports":[152],"APT":[153],"tracking,":[154],"attack-chain":[155],"provenance,":[156],"prediction.":[159]},"counts_by_year":[{"year":2026,"cited_by_count":2}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
