Counterattacking cyber threats: A framework for the future of cybersecurity
Amidst the rapid advancements in the digital landscape, the convergence of digitization and
cyber threats presents new challenges for organizational security. This article presents a …
cyber threats presents new challenges for organizational security. This article presents a …
Building knowledge graphs from unstructured texts: Applications and impact analyses in cybersecurity education
Knowledge graphs gained popularity in recent years and have been useful for concept
visualization and contextual information retrieval in various applications. However …
visualization and contextual information retrieval in various applications. However …
A Survey of Ontologies Considering General Safety, Security, and Operation Aspects in OT
The integration of information technology (IT) and operational technology (OT) is deepening,
amplifying the interconnectedness of operational, safety, and security demands within …
amplifying the interconnectedness of operational, safety, and security demands within …
[HTML][HTML] Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review
C Bratsas, EK Anastasiadis, AK Angelidis… - … of Cybersecurity and …, 2024 - mdpi.com
The amount of data related to cyber threats and cyber attack incidents is rapidly increasing.
The extracted information can provide security analysts with useful Cyber Threat Intelligence …
The extracted information can provide security analysts with useful Cyber Threat Intelligence …
A semantic model for security evaluation of information systems
Modern information systems are characterized by huge security related data streams. For
cyber security management in such systems, novel models and techniques for efficient …
cyber security management in such systems, novel models and techniques for efficient …
DEFIA: Evaluate defense effectiveness by fusing behavior information of cyberattacks
Z Liu, C Hu, C Shan, Z Peng - Information Sciences, 2023 - Elsevier
The existing researches point to a lack of studies addressing the quantitative evaluation of
the effectiveness of cyber defense. This difficult matter has been plaguing cyber security …
the effectiveness of cyber defense. This difficult matter has been plaguing cyber security …
Aiseckg: Knowledge graph dataset for cybersecurity education
G Agrawal - AAAI-MAKE 2023: Challenges Requiring the …, 2023 - par.nsf.gov
Cybersecurity education is exceptionally challenging as it involves learning the complex
attacks; tools and develo** critical problem-solving skills to defend the systems. For a …
attacks; tools and develo** critical problem-solving skills to defend the systems. For a …
Can I Sleep Safely in My Smarthome? A Novel Framework on Automating Dynamic Risk Assessment in IoT Environments
Fully automated homes, equipped with the latest Internet of Things (IoT) devices, aiming to
drastically improve the quality of lives of those inhabiting such homes, is it not a perfect …
drastically improve the quality of lives of those inhabiting such homes, is it not a perfect …
Cyberattack ontology: A knowledge representation for cyber supply chain security
Cyberattacks on cyber supply chain (CSC) systems and the cascading impacts have brought
many challenges and different threat levels with unpredictable consequences. The …
many challenges and different threat levels with unpredictable consequences. The …
An ontology for security patterns
Security is a fundamental requirement that we must keep in mind when develo** a
system. We approach the secure construction of software through the use of security …
system. We approach the secure construction of software through the use of security …