作者: Brian E. Ulicny , Jakub J. Moskal , Mieczyslaw M. Kokar , Keith Abe , John Kei Smith
DOI: 10.1007/978-3-319-11391-3_9
关键词:
摘要: The importance of visualization—discussed in the previous chapter—does not diminish critical role that algorithmic analysis plays achieving CSA. Algorithms reason about voluminous observations and data network infer important features situation help analysts decision-makers form their situational awareness. In order to perform this inference, make its output useful other algorithms human users, an algorithm needs have inputs outputs represented a consistent vocabulary well-specified terms relations, i.e., it ontology with clear semantics standard. This topic is focus present chapter. We already touched on Cognition Technology Now we discuss detail how, cyber operations, inference based can be used determine threat actor, target purpose potential courses action future impact. Since comprehensive for security does exist, show how such developed by taking advantage existing related standards markup languages.