ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2204.04769
  4. Cited By
A review of knowledge graph application scenarios in cyber security

A review of knowledge graph application scenarios in cyber security

10 April 2022
Kai-Chun Liu
Fei Wang
Zhaoyun Ding
Sheng Liang
Zhengfei Yu
Yun Zhou
ArXivPDFHTML

Papers citing "A review of knowledge graph application scenarios in cyber security"

3 / 3 papers shown
Title
PICO: Secure Transformers via Robust Prompt Isolation and Cybersecurity Oversight
PICO: Secure Transformers via Robust Prompt Isolation and Cybersecurity Oversight
Ben Goertzel
Paulos Yibelo
SILM
61
0
0
26 Apr 2025
Profile of Vulnerability Remediations in Dependencies Using Graph
  Analysis
Profile of Vulnerability Remediations in Dependencies Using Graph Analysis
Fernando Vera
Palina Pauliuchenka
Ethan Oh
Bai Chien Kao
Louis DiValentin
David A. Bader
32
0
0
08 Mar 2024
A Survey on Knowledge Graphs: Representation, Acquisition and
  Applications
A Survey on Knowledge Graphs: Representation, Acquisition and Applications
Shaoxiong Ji
Shirui Pan
Min Zhang
Pekka Marttinen
Philip S. Yu
200
1,944
0
02 Feb 2020
1