A survey on cybersecurity knowledge graph construction

X Zhao, R Jiang, Y Han, A Li, Z Peng - Computers & Security, 2024 - Elsevier
The development of key technologies of knowledge graph (KG) has promoted the
development of machine cognition technology, and the combination of KG and industry as …

Manufacturing cybersecurity threat attributes and countermeasures: Review, meta-taxonomy, and use cases of cyberattack taxonomies

MH Rahman, T Wuest, M Shafae - Journal of Manufacturing Systems, 2023 - Elsevier
The threat of cyberattacks on smart manufacturing systems has been rapidly growing with
the potential for a multitude of different attack types, varying from traditional espionage to …

Cyber threat intelligence model: an evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence

V Mavroeidis, S Bromander - 2017 European Intelligence and …, 2017 - ieeexplore.ieee.org
Threat intelligence is the provision of evidence-based knowledge about existing or potential
threats. Benefits of threat intelligence include improved efficiency and effectiveness in …

[PDF][PDF] Toward a knowledge graph of cybersecurity countermeasures

PE Kaloroumakis, MJ Smith - The MITRE Corporation, 2021 - next.d3fend.mitre.org
This paper describes our research and development toward a precise, unambiguous, and
information-dense knowledge graph of cybersecurity countermeasures. In project work for …

[HTML][HTML] Toward human digital twins for cybersecurity simulations on the metaverse: Ontological and network science approach

TN Nguyen - JMIRx Med, 2022 - xmed.jmir.org
Background: Cyber defense is reactive and slow. On average, the time-to-remedy is
hundreds of times larger than the time-to-compromise. In response, Human Digital Twins …

Ontologies and artificial intelligence systems for the cooperative smart farming ecosystem

SSL Chukkapalli, S Mittal, M Gupta… - Ieee …, 2020 - ieeexplore.ieee.org
Cyber-Physical Systems (CPS) and Internet of Thing (IoT) generate large amounts of data
spurring the rise of Artificial Intelligence (AI) based smart applications. Driven by rapid …

An ontology-driven framework for knowledge representation of digital extortion attacks

M Keshavarzi, HR Ghaffary - Computers in Human Behavior, 2023 - Elsevier
With the COVID-19 pandemic and the growing influence of the Internet in critical sectors of
industry and society, cyberattacks have not only not declined, but have risen sharply. In the …

The SEPSES knowledge graph: an integrated resource for cybersecurity

E Kiesling, A Ekelhart, K Kurniawan… - International Semantic …, 2019 - Springer
This paper introduces an evolving cybersecurity knowledge graph that integrates and links
critical information on real-world vulnerabilities, weaknesses and attack patterns from …

Effects of hand representations for ty** in virtual reality

J Grubert, L Witzani, E Ofek, M Pahud… - … IEEE Conference on …, 2018 - ieeexplore.ieee.org
Alphanumeric text entry is a challenge for Virtual Reality (VR) applications. VR enables new
capabilities, impossible in the real world, such as an unobstructed view of the keyboard …

Early detection of cybersecurity threats using collaborative cognition

SN Narayanan, A Ganesan, K Joshi… - 2018 IEEE 4th …, 2018 - ieeexplore.ieee.org
The early detection of cybersecurity events such as attacks is challenging given the
constantly evolving threat landscape. Even with advanced monitoring, sophisticated …