Fig. 4From: TIM: threat context-enhanced TTP intelligence mining on unstructured threat dataThe TCENet architecture. The upper path uses CNN and max-pooling to extract element features, and the lower path uses stack-BiLSTM + attention to extract text features. A fully connected layer is used to obtain the final feature vector after concatenating the result of two pathsBack to article page