Review on the Application of Knowledge Graph in Cyber Security Assessment

[1]  Sushil Jajodia,et al.  Implementing interactive analysis of attack graphs using relational databases , 2008, J. Comput. Secur..

[2]  Adiel Aviad,et al.  A Concept for Ontology-Based Value of Cybersecurity Knowledge , 2018 .

[3]  Tian Zhihong,et al.  Research on Defense Strategies Selection Based on Attack-Defense Stochastic Game Model , 2010 .

[4]  Li Aiping,et al.  Research on Active Defense Technology in Network Security Based on Non-Cooperative Dynamic Game Theory , 2011 .

[5]  LiYang,et al.  Knowledge Graph Construction Techniques , 2016 .

[6]  G. Manimaran,et al.  PENET: A practical method and tool for integrated modeling of security attacks and countermeasures , 2009, Comput. Secur..

[7]  Wang Shuo,et al.  Intelligent and Efficient Method for Optimal Penetration Path Generation , 2019 .

[8]  Huiqun Yu,et al.  Modeling and quantitatively predicting software security based on stochastic Petri nets , 2012, Math. Comput. Model..

[9]  Igor Nai Fovino,et al.  Integrating cyber attacks within fault trees , 2009, Reliab. Eng. Syst. Saf..

[10]  Wang Shan,et al.  A Survey on Ontology Learning Research , 2006 .

[11]  Sushil Jajodia,et al.  Interactive Analysis of Attack Graphs Using Relational Queries , 2006, DBSec.

[12]  Steven Noel,et al.  Chapter 4 – CyGraph: Graph-Based Analytics and Visualization for Cybersecurity , 2016 .

[13]  Bassem Nasser,et al.  A Formal Approach for the Evaluation of Network Security Mechanisms Based on RBAC Policies , 2005, Electron. Notes Theor. Comput. Sci..

[14]  C. Vargas‐De‐León,et al.  On the global stability of SIS, SIR and SIRS epidemic models with standard incidence , 2011 .

[15]  Yan Jia,et al.  A Practical Approach to Constructing a Knowledge Graph for Cybersecurity , 2018 .