Skip to main content

Table 8 Case study on recognition of three types of entities

From: Joint contrastive learning and belief rule base for named entity recognition in cybersecurity

Model

BBC

JCLB (Ours)

Abbreviation

Using the POODLE vulnerability can weaken the strength of encryption protocols... BGP hijacks NAC to bypass VLAN jump attacks, DHCP starvation attacks, and rogue DHCP servers...

Using the POODLE vulnerability can weaken the strength of encryption protocols... BGP hijacks NAC to bypass VLAN jump attacks, DHCP starvation attacks, and rogue DHCP servers...

Proper noun

The MSF file system can view the details of 12 related Eternal Blue through Kali, and the MS17-010 utilized module also details the vulnerability in the system of XP...

The MSF file system can view the details of 12 related Eternal Blue through Kali, and the MS17-010 utilized module also details the vulnerability in the system of XP...

Fixed-format

First to find the corresponding network adapter, the address to 1.1.1.1, mask 255.255.255.256, gateway blank...

First to find the corresponding network adapter, the address to 1.1.1.1, mask 255.255.255.256, gateway blank...

  1. The underlined texts denote recognized entities by two models