@Article{Creating_Cybersecurity_Knowledge_Graphs_from_Malware_After_Action_Reports,
author = "Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin, James Holt, and Richard Zak",
title = "{Creating Cybersecurity Knowledge Graphs from Malware After Action Reports}",
month = "December",
year = "2020",
note = "DOI: <a href="https://doi.org/10.1109/ACCESS.2020.3039234">10.1109/ACCESS.2020.3039234</a>
<br/>
<img src="https://i.imgur.com/VQp5ca8.jpg" style='height: 90%; width: 90%; object-fit: contain; display: block; margin-left: auto; margin-right: auto;'>
<div style="text-align:center">FIGURE 5. Hellsing malware entities in the Cybersecurity Knowledge Graph.</div>",
pages = "211691 - 211703",
volume = "8",
journal = "IEEE Access Journal",
publisher = "IEEE",
}