A Threat Intelligence Event Extraction Conceptual Model for Cyber Threat Intelligence Feeds Authors: Jamal H. Al-Yasiri, Mohamad Fadli Bin Zolkipli, Nik Fatinah N Mohd Farid, Mohammed Alsamman, Zainab Ali Mohammed | Published: 2025-06-04 Cyber ThreatEfficiency EvaluationInformation Extraction Method 2025.06.04 2025.06.06 Literature Database
Elevating Cyber Threat Intelligence against Disinformation Campaigns with LLM-based Concept Extraction and the FakeCTI Dataset Authors: Domenico Cotroneo, Roberto Natella, Vittorio Orbinato | Published: 2025-05-06 Bias Detection in AI OutputDetection of MisinformationInformation Extraction Method 2025.05.06 2025.05.27 Literature Database
Active Retrieval Augmented Generation Authors: Zhengbao Jiang, Frank F. Xu, Luyu Gao, Zhiqing Sun, Qian Liu, Jane Dwivedi-Yu, Yiming Yang, Jamie Callan, Graham Neubig | Published: 2023-05-11 | Updated: 2023-10-22 RAGInformation Extraction MethodQuestion Generation Method 2023.05.11 2025.05.28 Literature Database
Knowledge mining of unstructured information: application to cyber-domain Authors: Tuomas Takko, Kunal Bhattacharya, Martti Lehto, Pertti Jalasvirta, Aapo Cederberg, Kimmo Kaski | Published: 2021-09-08 | Updated: 2022-08-01 Risk Assessment MethodInformation Extraction MethodKnowledge Graph 2021.09.08 2025.05.28 Literature Database
Retrieval-Augmented Generation for Knowledge-Intensive NLP Tasks Authors: Patrick Lewis, Ethan Perez, Aleksandra Piktus, Fabio Petroni, Vladimir Karpukhin, Naman Goyal, Heinrich Küttler, Mike Lewis, Wen-tau Yih, Tim Rocktäschel, Sebastian Riedel, Douwe Kiela | Published: 2020-05-22 | Updated: 2021-04-12 RAGInformation Extraction MethodKnowledge Extraction Method 2020.05.22 2025.05.28 Literature Database