{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T15:00:46Z","timestamp":1777129246764,"version":"3.51.4"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T00:00:00Z","timestamp":1692835200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T00:00:00Z","timestamp":1692835200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61771001"],"award-info":[{"award-number":["61771001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2024,2]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Cyber-attack activities are complex and ever-changing, posing severe challenges to cybersecurity personnel. Introducing knowledge graphs into the field of cybersecurity helps depict the intricate cybersecurity landscape and provides technical support for threat identification and situational awareness. However, during the process of constructing knowledge graphs, inevitable noise and conflicts may be introduced, leading to misleading inferences and decisions. This paper aims to address the issues of constructing and assessing the quality of cybersecurity knowledge graphs. We manually constructed a dataset of cybersecurity knowledge graphs (CS13K) and expanded the existing cybersecurity ontology, building a more versatile ontology applicable to existing data features. Building upon this, we utilized Neo4j to construct the cybersecurity knowledge graph. Furthermore, we propose an AttTucker model, based on Transformer, for assessing the quality of knowledge graphs. By employing numerous self-attention heads, this model captures latent information among entities and relations. While reducing the dimensionality of knowledge embeddings, the model achieves evaluation results comparable to high-dimensional embeddings. Finally, we incorporate the path-level information between entities in the knowledge graph into the evaluation of knowledge graph quality based on the AttTucker model. Experimental analysis on both generic datasets and cybersecurity datasets demonstrates that our model significantly improves F1 value and accuracy in knowledge graph quality assessment tasks, outperforming other models.<\/jats:p>","DOI":"10.1007\/s40747-023-01205-1","type":"journal-article","created":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T04:02:30Z","timestamp":1692849750000},"page":"1201-1217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Cybersecurity knowledge graphs construction and quality assessment"],"prefix":"10.1007","volume":"10","author":[{"given":"Hongyi","family":"Li","sequence":"first","affiliation":[]},{"given":"Ze","family":"Shi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0497-7903","authenticated-orcid":false,"given":"Chengwei","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Di","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,24]]},"reference":[{"key":"1205_CR1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1706.03762","author":"A Vaswani","year":"2017","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez A (2017) Attention is all you need. NIPS. https:\/\/doi.org\/10.48550\/arXiv.1706.03762","journal-title":"NIPS"},{"key":"1205_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-022-00940-1","author":"J Wang","year":"2022","unstructured":"Wang J, Li X, An X (2022) Modeling multiple latent information graph structures via graph convolutional network for aspect-based sentiment analysis. Complex Intell Syst. https:\/\/doi.org\/10.1007\/s40747-022-00940-1","journal-title":"Complex Intell Syst"},{"key":"1205_CR3","unstructured":"Lal R (2013) Information extraction of security related entities and concepts from unstructured text. Dissertations & Theses - Gradworks"},{"key":"1205_CR4","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1308.4941","author":"RA Bridges","year":"2013","unstructured":"Bridges RA, Jones CL, Iannacone MD, Testa KM, Goodall JR (2013) Automatic labeling for entity extraction in cyber security. Comput Sci. https:\/\/doi.org\/10.48550\/arXiv.1308.4941","journal-title":"Comput Sci"},{"issue":"10","key":"1205_CR5","doi-asserted-by":"publisher","first-page":"2341","DOI":"10.1007\/s13042-020-01122-6","volume":"11","author":"G Kim","year":"2020","unstructured":"Kim G, Lee C, Jo J, Lim H (2020) Automatic extraction of named entities of cyber threats using a deep Bi-LSTM-CRF network. Int J Mach Learn Cybern 11(10):2341\u20132355. https:\/\/doi.org\/10.1007\/s13042-020-01122-6","journal-title":"Int J Mach Learn Cybern"},{"key":"1205_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00252","author":"X Wang","year":"2020","unstructured":"Wang X, Liu X, Ao S, Li N, Zhang X (2020) DNRTI: a large-scale dataset for named entity recognition in threat intelligence. TrustCom. https:\/\/doi.org\/10.1109\/TrustCom50675.2020.00252","journal-title":"TrustCom"},{"key":"1205_CR7","doi-asserted-by":"publisher","unstructured":"Guo, Y, Liu, Z, Huang, C, Liu, J, Jing, W, Wang, Z, Wang Y (2021) CyberRel: joint entity and relation extraction for cybersecurity concepts. In: International Conference on Information and Communications Security (pp. 447\u2013463). https:\/\/doi.org\/10.1007\/978-3-030-86890-1_25","DOI":"10.1007\/978-3-030-86890-1_25"},{"key":"1205_CR8","doi-asserted-by":"publisher","unstructured":"Rastogi N, Dutta S, Christian R, Gridley J, Zaki M, Gittens A (2021) Predicting malware threat intelligence using KGs. https:\/\/doi.org\/10.13140\/RG.2.2.12526.54083, arXiv:2102.05571","DOI":"10.13140\/RG.2.2.12526.54083"},{"key":"1205_CR9","doi-asserted-by":"crossref","unstructured":"Smith, B, (2012) Ontology. In: The furniture of the world. Brill. p. 47\u201368","DOI":"10.1163\/9789401207799_005"},{"key":"1205_CR10","unstructured":"Undercofer J, Joshi A, Finin T, Pinkston J (2003) A target-centric ontology for intrusion detection. In: Workshop on ontologies in distributed systems."},{"key":"1205_CR11","doi-asserted-by":"publisher","unstructured":"Iannacone M, Bohn S, Nakamura G, Gerth J, Goodall J (2015) Developing an ontology for cyber security knowledge graphs. The 10th Annual Cyber and Information Security Research Conference. https:\/\/doi.org\/10.1145\/2746266.2746278","DOI":"10.1145\/2746266.2746278"},{"key":"1205_CR12","unstructured":"Syed Z, Padia A, Finin T, Mathews L, Joshi A (2016) UCO: A unified cybersecurity ontology. In: Workshops at the thirtieth AAAI conference on artificial intelligence"},{"key":"1205_CR13","unstructured":"Vorobiev A, Bekmamedova N (2007) An ontological approach applied to information security and trust. ACIS 2007 Proceedings, 114"},{"key":"1205_CR14","doi-asserted-by":"publisher","unstructured":"Pingle A, Piplai A, Mittal S, Joshi A, Holt J, Zak R (2019) Relext: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement. In: Proceedings of the 2019 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining. https:\/\/doi.org\/10.48550\/arXiv.1905.02497","DOI":"10.48550\/arXiv.1905.02497"},{"issue":"3","key":"1205_CR15","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.1007\/s40747-021-00315-y","volume":"7","author":"L Xie","year":"2021","unstructured":"Xie L, Hu Z, Cai X, Zhang W, Chen J (2021) Explainable recommendation based on knowledge graph and multi-objective optimization. Complex Intell Syst 7(3):1241\u20131252. https:\/\/doi.org\/10.1007\/s40747-021-00315-y","journal-title":"Complex Intell Syst"},{"key":"1205_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-022-00806-6","author":"S Verma","year":"2022","unstructured":"Verma S, Bhatia R, Harit S, Batish S (2022) Scholarly knowledge graphs through structuring scholarly communication: a review. Complex Intell Syst. https:\/\/doi.org\/10.1007\/s40747-022-00806-6","journal-title":"Complex Intell Syst"},{"issue":"5","key":"1205_CR17","doi-asserted-by":"publisher","first-page":"3699","DOI":"10.1007\/s10586-022-03585-4","volume":"25","author":"N Andola","year":"2022","unstructured":"Andola N, Prakash S, Gahlot R (2022) An enhanced smart card and dynamic ID based remote multi-server user authentication scheme. Clust Comput 25(5):3699\u20133717. https:\/\/doi.org\/10.1007\/s10586-022-03585-4","journal-title":"Clust Comput"},{"key":"1205_CR18","doi-asserted-by":"publisher","first-page":"101050","DOI":"10.1016\/j.pmcj.2019.101050","volume":"59","author":"N Andola","year":"2019","unstructured":"Andola N, Gogoi M, Venkatesan S (2019) Vulnerabilities on hyperledger fabric. Pervasive Mobile Comput 59:101050. https:\/\/doi.org\/10.1016\/j.pmcj.2019.101050","journal-title":"Pervasive Mobile Comput"},{"key":"1205_CR19","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s11277-021-08214-8","volume":"119","author":"N Andola","year":"2021","unstructured":"Andola N, Raghav YVK (2021) SpyChain: a lightweight blockchain for authentication and anonymous authorization in IoD. Wireless Pers Commun 119:343\u2013362. https:\/\/doi.org\/10.1007\/s11277-021-08214-8","journal-title":"Wireless Pers Commun"},{"issue":"2","key":"1205_CR20","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1002\/acs.3529","volume":"37","author":"Z Zhang","year":"2023","unstructured":"Zhang Z, Song X, Sun X (2023) Hybrid-driven-based fuzzy secure filtering for nonlinear parabolic partial differential equation systems with cyber attacks. Int J Adapt Control Signal Process 37(2):380\u2013398. https:\/\/doi.org\/10.1002\/acs.3529","journal-title":"Int J Adapt Control Signal Process"},{"issue":"5","key":"1205_CR21","doi-asserted-by":"publisher","first-page":"5616","DOI":"10.1109\/TIA.2022.3184668","volume":"58","author":"W Wang","year":"2022","unstructured":"Wang W, Han Z, Alazab M (2022) Ultra super fast authentication protocol for electric vehicle charging using extended chaotic maps. IEEE Trans Ind Appl 58(5):5616\u20135623. https:\/\/doi.org\/10.1109\/TIA.2022.3184668","journal-title":"IEEE Trans Ind Appl"},{"issue":"5","key":"1205_CR22","doi-asserted-by":"publisher","first-page":"3501","DOI":"10.1109\/TII.2021.3119038","volume":"18","author":"M Alazab","year":"2021","unstructured":"Alazab M, RM SP, Parimala M (2021) Federated learning for cybersecurity: concepts, challenges, and future directions. IEEE Transact Industrial Inform 18(5):3501\u20133509. https:\/\/doi.org\/10.1109\/TII.2021.3119038","journal-title":"IEEE Transact Industrial Inform"},{"issue":"1","key":"1205_CR23","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.eng.2018.01.004","volume":"4","author":"Y Jia","year":"2018","unstructured":"Jia Y, Qi Y, Shang H, Jiang R, Li A (2018) A practical approach to constructing a knowledge graph for cybersecurity. Engineering 4(1):53\u201360. https:\/\/doi.org\/10.1016\/j.eng.2018.01.004","journal-title":"Engineering"},{"key":"1205_CR24","unstructured":"Harley E, Purdy S, Limiero M, Lu T, Mathews W (2018) CyGraph: big-data graph analysis for cybersecurity and mission resilience. MITRE CORP MCLEAN VA"},{"key":"1205_CR25","doi-asserted-by":"publisher","unstructured":"Kiesling E, Ekelhart A, Kurniawan K, Ekaputra F (2019) The SEPSES knowledge graph: an integrated resource for cybersecurity. In: International Semantic Web Conference 198\u2013214. https:\/\/doi.org\/10.1007\/978-3-030-30796-7_13","DOI":"10.1007\/978-3-030-30796-7_13"},{"key":"1205_CR26","doi-asserted-by":"publisher","unstructured":"Lehmann J, B\u00fchmann L (2010) ORE-a tool for repairing and enriching knowledge bases. In: International Semantic Web Conference 177\u2013193. https:\/\/doi.org\/10.1007\/978-3-642-17749-1_12","DOI":"10.1007\/978-3-642-17749-1_12"},{"key":"1205_CR27","doi-asserted-by":"publisher","unstructured":"Bougiatiotis K, Fasoulis R, Aisopos F, Nentidis A, Paliouras G (2020) Guiding Graph Embeddings using Path-Ranking Methods for Error Detection innoisy Knowledge Graphs. https:\/\/doi.org\/10.48550\/arXiv.2002.08762","DOI":"10.48550\/arXiv.2002.08762"},{"key":"1205_CR28","doi-asserted-by":"publisher","unstructured":"Xie R, Liu Z, Lin F, Lin L (2018) Does william shakespeare really write hamlet? Knowledge representation learning with confidence. Proc AAAI Conf Artif Intell 32(1). https:\/\/doi.org\/10.48550\/arXiv.1705.03202","DOI":"10.48550\/arXiv.1705.03202"},{"key":"1205_CR29","doi-asserted-by":"crossref","unstructured":"Mendes PN, M\u00fchleisen H, Bizer C (2012) Sieve: linked data quality assessment and fusion. In: Proceedings of the 2012 joint EDBT\/ICDT workshops116\u2013123","DOI":"10.1145\/2320765.2320803"},{"key":"1205_CR30","doi-asserted-by":"publisher","unstructured":"Jia S, Xiang Y, Chen X, Wang K (2019) Triple trustworthiness measurement for knowledge graph. In: The World Wide Web Conference 2865\u20132871. https:\/\/doi.org\/10.48550\/arXiv.1809.09414","DOI":"10.48550\/arXiv.1809.09414"},{"key":"1205_CR31","doi-asserted-by":"publisher","unstructured":"Zhang Y, Yao Q, Dai W (2020) AutoSF: searching scoring functions for knowledge graph embedding. 2020 IEEE 36th International Conference on Data Engineering (ICDE). IEEE, 433\u2013444. https:\/\/doi.org\/10.1109\/ICDE48307.2020.00044","DOI":"10.1109\/ICDE48307.2020.00044"},{"key":"1205_CR32","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.patrec.2021.07.027","volume":"151","author":"S Dash","year":"2021","unstructured":"Dash S, Chakraborty C, Giri SK (2021) Intelligent computing on time-series data analysis and prediction of COVID-19 pandemics. Pattern Recogn Lett 151:69\u201375. https:\/\/doi.org\/10.1016\/j.patrec.2021.07.027","journal-title":"Pattern Recogn Lett"},{"key":"1205_CR33","doi-asserted-by":"publisher","first-page":"16435","DOI":"10.1109\/ACCESS.2021.3052884","volume":"9","author":"A Sarkar","year":"2021","unstructured":"Sarkar A, Khan MZ, Singh MM (2021) Artificial neural synchronization using nature inspired whale optimization. IEEE Access 9:16435\u201316447. https:\/\/doi.org\/10.1109\/ACCESS.2021.3052884","journal-title":"IEEE Access"},{"issue":"11","key":"1205_CR34","doi-asserted-by":"publisher","first-page":"115005","DOI":"10.1088\/1361-6501\/ac8368","volume":"33","author":"H Tao","year":"2022","unstructured":"Tao H, Cheng L, Qiu J (2022) Few shot cross equipment fault diagnosis method based on parameter optimization and feature mertic. Measurement Sci Technol 33(11):115005. https:\/\/doi.org\/10.1088\/1361-6501\/ac8368","journal-title":"Measurement Sci Technol"},{"issue":"1","key":"1205_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.33640\/2405-609X.3197","volume":"8","author":"RM Aziz","year":"2022","unstructured":"Aziz RM, Hussain A, Sharma P (2022) Machine learning-based soft computing regression analysis approach for crime data prediction. Karbala Int J Modern Sci 8(1):1\u201319. https:\/\/doi.org\/10.33640\/2405-609X.3197","journal-title":"Karbala Int J Modern Sci"},{"issue":"2","key":"1205_CR36","doi-asserted-by":"publisher","first-page":"139","DOI":"10.33640\/2405-609X.3229","volume":"8","author":"RM Aziz","year":"2022","unstructured":"Aziz RM, Baluch MF, Patel S (2022) A machine learning based approach to detect the Ethereum fraud transactions with limited attributes. Karbala Int J Modern Sci 8(2):139\u2013151","journal-title":"Karbala Int J Modern Sci"},{"key":"1205_CR37","doi-asserted-by":"publisher","unstructured":"Bala\u017eevi\u0107 I, Allen C, Hospedales T M (2019) Tucker: Tensor factorization for knowledge graph completion. arXiv preprint arXiv:1901.09590. https:\/\/doi.org\/10.18653\/v1\/D19-1522","DOI":"10.18653\/v1\/D19-1522"},{"key":"1205_CR38","doi-asserted-by":"crossref","unstructured":"Wang Z, Zhang J, Feng J, Chen Z (2014) Knowledge graph embedding by translating on hyperplanes. In: Proceedings of the AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v28i1.8870"},{"key":"1205_CR39","doi-asserted-by":"crossref","unstructured":"Zhao, Y. Feng H, Gallinari PJE (2019) Embedding learning with triple trustiness on noisy knowledge graph 21(11):1083","DOI":"10.3390\/e21111083"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01205-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-023-01205-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01205-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,10]],"date-time":"2024-02-10T22:32:30Z","timestamp":1707604350000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-023-01205-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,24]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["1205"],"URL":"https:\/\/doi.org\/10.1007\/s40747-023-01205-1","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,24]]},"assertion":[{"value":"28 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 August 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}