From: Joint contrastive learning and belief rule base for named entity recognition in cybersecurity
Model | BBC | JCLB (Ours) |
---|---|---|
Abbreviation | Using the POODLE vulnerability can weaken the strength of encryption protocols... BGP hijacks NAC to bypass VLAN jump attacks, DHCP starvation attacks, and rogue DHCP servers... | Using the POODLE vulnerability can weaken the strength of encryption protocols... BGP hijacks NAC to bypass VLAN jump attacks, DHCP starvation attacks, and rogue DHCP servers... |
Proper noun | The MSF file system can view the details of 12 related Eternal Blue through Kali, and the MS17-010 utilized module also details the vulnerability in the system of XP... | The MSF file system can view the details of 12 related Eternal Blue through Kali, and the MS17-010 utilized module also details the vulnerability in the system of XP... |
Fixed-format | First to find the corresponding network adapter, the address to 1.1.1.1, mask 255.255.255.256, gateway blank... | First to find the corresponding network adapter, the address to 1.1.1.1, mask 255.255.255.256, gateway blank... |