Fig. 5From: Data and knowledge-driven named entity recognition for cyber securityModel flow chartBack to article page