Recommendations for Responding to System Security Incidents Using Knowledge Graph Embedding
ELECTRONICS(2024)
Key words
security incident responses,security vulnerability similarity,knowledge graph generation,knowledge graph embedding
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined