Data-driven analytics for cyber-threat intelligence and information sharing

作者: Sara Qamar , Zahid Anwar , Mohammad Ashiqur Rahman , Ehab Al-Shaer , Bei-Tseng Chu

DOI: 10.1016/J.COSE.2017.02.005

关键词: AnalyticsFormal specificationRisk analysis (business)Risk assessmentProfiling (information science)Context analysisComputer scienceWeb Ontology LanguageVulnerabilityInformation sharingData-drivenComputer security

摘要: … presents a comprehensive semantic model considering STIX, … architectural schematics and analyze the impact of potential … of employing different relevance computing factors (F) allows …

参考文章(18)
Brian E. Ulicny, Jakub J. Moskal, Mieczyslaw M. Kokar, Keith Abe, John Kei Smith, Inference and Ontologies Cyber Defense and Situational Awareness. pp. 167- 199 ,(2014) , 10.1007/978-3-319-11391-3_9
Holger Knublauch, Ray W. Fergerson, Natalya F. Noy, Mark A. Musen, The protégé OWL plugin: an open development environment for semantic web applications international semantic web conference. pp. 229- 243 ,(2004) , 10.1007/978-3-540-30475-3_17
Zhi-tang Li, Jie Lei, Li Wang, Dong Li, Yang-ming Ma, Towards identifying true threat from network security data pacific asia workshop on intelligence and security informatics. pp. 160- 171 ,(2007) , 10.1007/978-3-540-71549-8_14
Flora S. Tsai, Kap Luk Chan, Detecting cyber security threats in weblogs using probabilistic models pacific asia workshop on intelligence and security informatics. pp. 46- 57 ,(2007) , 10.1007/978-3-540-71549-8_4
H. Lan, SWRL : A semantic Web rule language combining OWL and ruleML World Wide Web Consortium (W3C). ,(2004)
Alan L. Rector, Nick Drummond, Matthew Horridge, Hai Wang, John Goodwin, Robert Stevens, The manchester OWL syntax owl experiences and directions. ,(2006)
Thomas Hofmann, Probabilistic latent semantic analysis uncertainty in artificial intelligence. ,vol. 15, pp. 289- 296 ,(1999)
A. Medina, A. Lakhina, I. Matta, J. Byers, BRITE: an approach to universal topology generation modeling analysis and simulation on computer and telecommunication systems. pp. 346- 353 ,(2001) , 10.1109/MASCOT.2001.948886
Oliver Heckmann, Michael Piringer, Jens Schmitt, Ralf Steinmetz, On realistic network topologies for simulation acm special interest group on data communication. pp. 28- 32 ,(2003) , 10.1145/944773.944779
MARKUS STUMPTNER, GERHARD E. FRIEDRICH, ALOIS HASELBÖCK, Generative constraint-based configuration of large technical systems Ai Edam Artificial Intelligence for Engineering Design, Analysis and Manufacturing. ,vol. 12, pp. 307- 320 ,(1998) , 10.1017/S0890060498124046