Note to Practitioners—The rising complexity of software systems introduces new challenges in cybersecurity, notably in how multiple vulnerabilities are exploited simultaneously, a tactic increasingly common in cyber-attacks. This work’s contribution, TCGFormer, offers a novel approach to predict and analyze such threats by recognizing patterns in historical data and predicting future exploits. While our method advances the detection of complex attack strategies, it remains essential to integrate these insights with existing security protocols to enhance their effectiveness. Practitioners are encouraged to consider how this method could be tailored to fit specific security needs, and to explore its integration into broader cybersecurity frameworks to protect against sophisticated cyber threats effectively.">

Time-Aware Cybersecurity Knowledge Graph Reasoning Method for Vulnerability Analysis (original) (raw)

IEEE Account

Purchase Details

Profile Information

Need Help?

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.
© Copyright 2026 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.