A survey on cybersecurity knowledge graph construction
X Zhao, R Jiang, Y Han, A Li, Z Peng - Computers & Security, 2024 - Elsevier
The development of key technologies of knowledge graph (KG) has promoted the
development of machine cognition technology, and the combination of KG and industry as …
development of machine cognition technology, and the combination of KG and industry as …
Manufacturing cybersecurity threat attributes and countermeasures: Review, meta-taxonomy, and use cases of cyberattack taxonomies
The threat of cyberattacks on smart manufacturing systems has been rapidly growing with
the potential for a multitude of different attack types, varying from traditional espionage to …
the potential for a multitude of different attack types, varying from traditional espionage to …
Cyber threat intelligence model: an evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence
Threat intelligence is the provision of evidence-based knowledge about existing or potential
threats. Benefits of threat intelligence include improved efficiency and effectiveness in …
threats. Benefits of threat intelligence include improved efficiency and effectiveness in …
[PDF][PDF] Toward a knowledge graph of cybersecurity countermeasures
PE Kaloroumakis, MJ Smith - The MITRE Corporation, 2021 - next.d3fend.mitre.org
This paper describes our research and development toward a precise, unambiguous, and
information-dense knowledge graph of cybersecurity countermeasures. In project work for …
information-dense knowledge graph of cybersecurity countermeasures. In project work for …
[HTML][HTML] Toward human digital twins for cybersecurity simulations on the metaverse: Ontological and network science approach
TN Nguyen - JMIRx Med, 2022 - xmed.jmir.org
Background: Cyber defense is reactive and slow. On average, the time-to-remedy is
hundreds of times larger than the time-to-compromise. In response, Human Digital Twins …
hundreds of times larger than the time-to-compromise. In response, Human Digital Twins …
Ontologies and artificial intelligence systems for the cooperative smart farming ecosystem
Cyber-Physical Systems (CPS) and Internet of Thing (IoT) generate large amounts of data
spurring the rise of Artificial Intelligence (AI) based smart applications. Driven by rapid …
spurring the rise of Artificial Intelligence (AI) based smart applications. Driven by rapid …
An ontology-driven framework for knowledge representation of digital extortion attacks
M Keshavarzi, HR Ghaffary - Computers in Human Behavior, 2023 - Elsevier
With the COVID-19 pandemic and the growing influence of the Internet in critical sectors of
industry and society, cyberattacks have not only not declined, but have risen sharply. In the …
industry and society, cyberattacks have not only not declined, but have risen sharply. In the …
The SEPSES knowledge graph: an integrated resource for cybersecurity
This paper introduces an evolving cybersecurity knowledge graph that integrates and links
critical information on real-world vulnerabilities, weaknesses and attack patterns from …
critical information on real-world vulnerabilities, weaknesses and attack patterns from …
Effects of hand representations for ty** in virtual reality
Alphanumeric text entry is a challenge for Virtual Reality (VR) applications. VR enables new
capabilities, impossible in the real world, such as an unobstructed view of the keyboard …
capabilities, impossible in the real world, such as an unobstructed view of the keyboard …
Early detection of cybersecurity threats using collaborative cognition
The early detection of cybersecurity events such as attacks is challenging given the
constantly evolving threat landscape. Even with advanced monitoring, sophisticated …
constantly evolving threat landscape. Even with advanced monitoring, sophisticated …