Fig. 9From: Data and knowledge-driven named entity recognition for cyber securityRare entity recognition instance for cyber securityBack to article page