The SEPSES Knowledge Graph: An Integrated Resource for Cybersecurity
暂无分享,去创建一个
Kabul Kurniawan | Andreas Ekelhart | Fajar J. Ekaputra | Elmar Kiesling | Andreas Ekelhart | F. Ekaputra | Elmar Kiesling | Kabul Kurniawan
[1] Myong H. Kang,et al. Security Ontology for Annotating Resources , 2005, OTM Conferences.
[2] Stefan Fenz,et al. Formalizing information security knowledge , 2009, ASIACCS '09.
[3] Stefan Fenz,et al. AURUM: A Framework for Information Security Risk Management , 2009 .
[4] Michael D. Iannacone,et al. Developing an Ontology for Cyber Security Knowledge Graphs , 2015, CISR.
[5] Ju An Wang,et al. An Ontological Approach to Computer System Security , 2010, Inf. Secur. J. A Glob. Perspect..
[6] Sergei Nirenburg,et al. Ontology in information security: a useful theoretical foundation and methodological tool , 2001, NSPW '01.
[7] Anupam Joshi,et al. Modeling Computer Attacks: An Ontology for Intrusion Detection , 2003, RAID.
[8] Markus Schumacher,et al. 6. Toward a Security Core Ontology , 2003 .
[9] Ju An Wang,et al. Security Data Mining in an Ontology for Vulnerability Management , 2009, 2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing.
[10] Isabelle Comyn-Wattiau,et al. Ontologies for Security Requirements: A Literature Survey and Classification , 2012, CAiSE Workshops.
[11] Mieczyslaw M. Kokar,et al. Inference and Ontologies , 2014, Cyber Defense and Situational Awareness.
[12] Ankur Padia,et al. UCO: A Unified Cybersecurity Ontology , 2016, AAAI Workshop: Artificial Intelligence for Cyber Security.
[13] Lorrie Faith Cranor,et al. Building an Ontology of Cyber Security , 2014, STIDS.
[14] Leo Obrst,et al. Developing an Ontology of the Cyber Security Domain , 2012, STIDS.