Author
Listed:
- Chunwang Wu
(School of Cyber Science and Engineering, Sichuan University, Chengdu, P. R. China†Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu, P. R. China)
- Jiayong Liu
(School of Cyber Science and Engineering, Sichuan University, Chengdu, P. R. China)
- Cheng Huang
(School of Cyber Science and Engineering, Sichuan University, Chengdu, P. R. China)
- Linxia Li
(��School of Preclinical Medicine, Chengdu University, Chengdu, P. R. China)
Abstract
In the current landscape, the Internet of Things (IoT) finds its utility across diverse sectors, including finance, healthcare, and beyond. However, security emerges as the principal obstacle impeding the advancement of IoT. Given the intricate nature of IoT cybersecurity, traditional security protocols fall short when addressing the unique challenges within the IoT domain. Security strategies anchored in the cybersecurity knowledge graph present a robust solution to safeguard IoT ecosystems. The foundation of these strategies lies in the intricate networks of the cybersecurity knowledge graph, with Named Entity Recognition (NER) serving as a crucial initial step in its implementation. Conventional cybersecurity entity recognition approaches IoT grapple with the complexity of cybersecurity entities, characterized by their sophisticated structures and vague meanings. Additionally, these traditional models are inadequate at discerning all the interrelations between cybersecurity entities, rendering their direct application in IoT security impractical. This paper introduces an innovative Cybersecurity Entity Recognition Model, referred to as CERM, designed to pinpoint cybersecurity entities within IoT. CERM employs a hierarchical attention mechanism that proficiently maps the interdependencies among cybersecurity entities. Leveraging these mapped dependencies, CERM precisely identifies IoT cybersecurity entities. Comparative evaluation experiments illustrate CERM’s superior performance over the existing entity recognition models, marking a significant advancement in the field of IoT security.
Suggested Citation
Chunwang Wu & Jiayong Liu & Cheng Huang & Linxia Li, 2025.
"Cybersecurity entity recognition model for IoT via hierarchical attention mechanism,"
International Journal of Modern Physics C (IJMPC), World Scientific Publishing Co. Pte. Ltd., vol. 36(10), pages 1-15, October.
Handle:
RePEc:wsi:ijmpcx:v:36:y:2025:i:10:n:s0129183124420130
DOI: 10.1142/S0129183124420130
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wsi:ijmpcx:v:36:y:2025:i:10:n:s0129183124420130. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Tai Tone Lim (email available below). General contact details of provider: http://www.worldscinet.com/ijmpc/ijmpc.shtml .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.