Fig. 2From: Data and knowledge-driven named entity recognition for cyber securityConstructing dictionary feature vector based on N-gram feature templateBack to article page