دورية أكاديمية

Building Knowledge Graphs from Unstructured Texts: Applications and Impact Analyses in Cybersecurity Education.

التفاصيل البيبلوغرافية
العنوان: Building Knowledge Graphs from Unstructured Texts: Applications and Impact Analyses in Cybersecurity Education.
المؤلفون: Agrawal, Garima, Deng, Yuli, Park, Jongchan, Liu, Huan, Chen, Ying-Chih
المصدر: Information (2078-2489); Nov2022, Vol. 13 Issue 11, p526, 22p
مصطلحات موضوعية: KNOWLEDGE graphs, INTERNET security, INTERACTIVE learning, QUESTION answering systems, DATA visualization
مستخلص: Knowledge graphs gained popularity in recent years and have been useful for concept visualization and contextual information retrieval in various applications. However, constructing a knowledge graph by scraping long and complex unstructured texts for a new domain in the absence of a well-defined ontology or an existing labeled entity-relation dataset is difficult. Domains such as cybersecurity education can harness knowledge graphs to create a student-focused interactive and learning environment to teach cybersecurity. Learning cybersecurity involves gaining the knowledge of different attack and defense techniques, system setup and solving multi-facet complex real-world challenges that demand adaptive learning strategies and cognitive engagement. However, there are no standard datasets for the cybersecurity education domain. In this research work, we present a bottom-up approach to curate entity-relation pairs and construct knowledge graphs and question-answering models for cybersecurity education. To evaluate the impact of our new learning paradigm, we conducted surveys and interviews with students after each project to find the usefulness of bot and the knowledge graphs. Our results show that students found these tools informative for learning the core concepts and they used knowledge graphs as a visual reference to cross check the progress that helped them complete the project tasks. [ABSTRACT FROM AUTHOR]
Copyright of Information (2078-2489) is the property of MDPI and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Complementary Index
الوصف
تدمد:20782489
DOI:10.3390/info13110526