Construction of knowledge graph of hardware Trojan detection method | |
---|---|
Author | |
Abstract |
In order to visually present all kinds of hardware Trojan horse detection methods and their relationship, a method is proposed to construct the knowledge graph of hardware Trojan horse detection technology. Firstly, the security-related knowledge of hardware Trojan horse is analyzed, then the entity recognition and relationship extraction are carried out by using BiLSTM-CRF model, and the construction of knowledge graph is completed. Finally, the knowledge is stored and displayed visually by using graph database neo4j. The combination of knowledge graph and hardware Trojan security field can summarize the existing detection technologies, provide a basis for the analysis of hardware Trojans, vigorously promote the energy Internet security construction, and steadily enhance the energy Internet active defense capability. |
Year of Publication |
2022
|
Date Published |
apr
|
Publisher |
IEEE
|
Conference Location |
Hangzhou, China
|
ISBN Number |
978-1-66541-819-5
|
URL |
https://ieeexplore.ieee.org/document/9783791/
|
DOI |
10.1109/ACPEE53904.2022.9783791
|
Google Scholar | BibTeX | DOI |