{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T22:45:25Z","timestamp":1753051525901,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811982842"},{"type":"electronic","value":"9789811982859"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,12,10]],"date-time":"2022-12-10T00:00:00Z","timestamp":1670630400000},"content-version":"vor","delay-in-days":343,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>There is a huge Internet user group in China, and many enterprises and institutions are deeply affected by the threat of Cybersecurity vulnerabilities. At present, according to the needs of different business scenarios, relevant business personnel often need to search for different vulnerability information separately, relying on manpower, and the vulnerability intelligence distributed on the Internet has the characteristics of multi-source heterogeneity, which is difficult to ensure the effectiveness and reliability of vulnerability knowledge. In view of the above background, with vulnerabilities as the core, knowledge extraction of vulnerability intelligence is carried out according to existing standards, corresponding entities and relationships are established, and related and visualized knowledge graphs are studied and constructed to provide support for the discovery and traceability of vulnerability threats by information workers.<\/jats:p>","DOI":"10.1007\/978-981-19-8285-9_13","type":"book-chapter","created":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T20:02:48Z","timestamp":1670616168000},"page":"177-184","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Knowledge Graph Construction Research From Multi-source Vulnerability Intelligence"],"prefix":"10.1007","author":[{"given":"Lin","family":"Du","sequence":"first","affiliation":[]},{"given":"Chuanqi","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,10]]},"reference":[{"key":"13_CR1","unstructured":"Singhal, A: Introducing the knowledge graph: things, not strings. Offic. Google Blog 5, 16 (2012)"},{"key":"13_CR2","unstructured":"An, N., An, L.: Construction and comparison of cross-platform online public opinion knowledge graph. Inf. Sci. 40(03):159\u2013165 (2022). (in Chinese)"},{"key":"13_CR3","unstructured":"Xiao, L., Li, J. X., Ge, L., et al.: Knowledge graph construction for decision support of grain situation. J. Chin. Cereals Oils Assoc. 03(05), 1\u201314 (2022). (in Chinese)"},{"key":"13_CR4","unstructured":"Mou, T.H., Li, S. Y.: Knowledge graph construction for control systems in process industry. Chin. J. Intell. Sci. Technol. 4(01), 129\u2013141 (2022). (in Chinese)"},{"key":"13_CR5","unstructured":"Zhang, K.L., Hu, C.X., Song, Y., et al.: Construction of Chinese obstetric knowledge graph based on multiple source data. J. Zhengzhou Univ. Natl. Sci. Ed. 05(30), 1\u20137 (2022). (in Chinese)"},{"key":"13_CR6","unstructured":"Dong, C., Jiang, B., Lu, Z.G., et al.: Knowledge graph for cyberspace security intelligence: a survey. J. Cyber Secur. 5(05), 56\u201376 (2020). (in Chinese)"},{"key":"13_CR7","unstructured":"Ji, S.X., Pan, S.R., Cambria, E., et al.: A Survey on Knowledge Graphs: representation, acquisition and applications. arXiv preprint arXiv:2002.00388 (2021)"},{"key":"13_CR8","volume-title":"Information Security Technology\u2014Cybersecurity Vulnerability Identification and Description Specification: GB\/T 28458\u20132020","author":"NISST Committee","year":"2020","unstructured":"Committee, N.I.S.S.T.: Information Security Technology\u2014Cybersecurity Vulnerability Identification and Description Specification: GB\/T 28458\u20132020. Standards Press of China, Beijing (2020).(in Chinese)"},{"key":"13_CR9","volume-title":"Information Security Technology\u2014Specification for Cybersecurity Vulnerability Management: GB\/T 30276\u20132020","author":"NISST Committee","year":"2020","unstructured":"Committee, N.I.S.S.T.: Information Security Technology\u2014Specification for Cybersecurity Vulnerability Management: GB\/T 30276\u20132020. Standards Press of China, Beijing (2020).(in Chinese)"},{"key":"13_CR10","unstructured":"Zhou, W.P., Yang, W.Y., Wang, X.H., et al.: Research on penetration testing tool for industrial control system. Comput. Eng. 45(08), 92\u2013101 (2019). (in Chinese)"},{"key":"13_CR11","unstructured":"Reimers, N., Gurevych, I.: Optimal Hyperparameters for Deep LSTM-Networks for Sequence Labeling Tasks. arXiv preprint arXiv:1707.06799 (2017)"},{"key":"13_CR12","unstructured":"Zhang, R.B., Liu, J.Y., He, X.: Named entity recognition for vulnerabilities based on BLSTM-CRF model. J. Sichuan Univ. Natl. Sci. 56(03), 469\u2013475 (2019). (in Chinese)"}],"container-title":["Communications in Computer and Information Science","Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-8285-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,24]],"date-time":"2022-12-24T00:04:08Z","timestamp":1671840248000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-8285-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811982842","9789811982859"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-8285-9_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CNCERT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China Cyber Security Annual Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 August 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cncert2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conf.cert.org.cn","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}