Fig. 1From: Data and knowledge-driven named entity recognition for cyber securityCyber security NER ModelBack to article page