Fig. 4From: Data and knowledge-driven named entity recognition for cyber securityScaled Dot-Product AttentionBack to article page