Alert button

Constructing Flow Graphs from Procedural Cybersecurity Texts

Add code
Bookmark button
Alert button
May 29, 2021
Kuntal Kumar Pal, Kazuaki Kashihara, Pratyay Banerjee, Swaroop Mishra, Ruoyu Wang, Chitta Baral

Figure 1 for Constructing Flow Graphs from Procedural Cybersecurity Texts
Figure 2 for Constructing Flow Graphs from Procedural Cybersecurity Texts
Figure 3 for Constructing Flow Graphs from Procedural Cybersecurity Texts
Figure 4 for Constructing Flow Graphs from Procedural Cybersecurity Texts

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: