@Article{Creating_Cybersecurity_Knowledge_Graphs_from_Malware_After_Action_Reports, author = "Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin, James Holt, and Richard Zak", title = "{Creating Cybersecurity Knowledge Graphs from Malware After Action Reports}", month = "December", year = "2020", note = "DOI: <a href="https://doi.org/10.1109/ACCESS.2020.3039234">10.1109/ACCESS.2020.3039234</a> <br/> <img src="https://i.imgur.com/VQp5ca8.jpg" style='height: 90%; width: 90%; object-fit: contain; display: block; margin-left: auto; margin-right: auto;'> <div style="text-align:center">FIGURE 5. Hellsing malware entities in the Cybersecurity Knowledge Graph.</div>", pages = "211691 - 211703", volume = "8", journal = "IEEE Access Journal", publisher = "IEEE", }