@Article{Creating_Cybersecurity_Knowledge_Graphs_from_Malware_After_Action_Reports,
	author = "Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin, James Holt, and Richard Zak",
	title = "{Creating Cybersecurity Knowledge Graphs from Malware After Action Reports}",
	month = "December",
	year = "2020",
	note = "DOI: <a href="https://doi.org/10.1109/ACCESS.2020.3039234">10.1109/ACCESS.2020.3039234</a>
<br/>
<img src="https://i.imgur.com/VQp5ca8.jpg" style='height: 90%; width: 90%; object-fit: contain; display: block; margin-left: auto; margin-right: auto;'>
<div style="text-align:center">FIGURE 5. Hellsing malware entities in the Cybersecurity Knowledge Graph.</div>",
	pages = "211691 - 211703",
	volume = "8",
	journal = "IEEE Access Journal",
	publisher = "IEEE",
}