A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Improving security incidents detection for networked multilevel intelligent control systems in railway transport
2016
Telfor Journal
We use a rough sets theory to detect an abnormal activity in the considered system. ...
Keywords -intelligent transport systems, railway control systems, rough set theory, security information and event management. ...
The application-oriented part of MICS begins with domain ontology. An approach based on ontology is applied in cases of creation of a system with the continuous adaptation, extension and scaling. ...
doi:10.5937/telfor1601014c
fatcat:jz5zkffm2vhvbeqv5uxfo4gl3u
An Autonomic Ontology-Based Multiagent System for Intrusion Detection in Computing Environments
2010
International Journal for Infonomics
In order to address the problem of protecting computational resources, in this work we propose an autonomic model called AutoCore, constituted by a Multi-Agent system, an Intelligent Interface (CoreEditor ...
) and a formal ontology (CoreSec). ...
The AutoCore makes use of CoreSec as an ontology knowledge base, which is a domain-ontology with high-level concepts for information security, giving aid the management of IT. ...
doi:10.20533/iji.1742.4712.2010.0019
fatcat:7po43x7bczdnxnwnsaesvfhrlq
A Security Determination-Reaction Architecture for Heterogeneous Distributed Network
2017
International Journal of Scientific Research in Computer Sciences and Engineering
particularly applied to telecom infrastructures security. ...
The main focus of this paper is to provide a global architectural solution built on the requirements for a reaction after alert detection mechanisms in the frame of Information Systems Security and more ...
Ontology may be categorized as domain ontology when it concerns concepts and their relations from a same and well defined domain or top-level ontology when it concerns very general domain-independent concepts ...
doi:10.26438/ijsrcse/v5i5.2634
fatcat:2u5aknelcvhsxde5xejz3homhm
REDEFINING CYBERSECURITY THROUGH PROCESSUAL ONTOLOGY OF THE CYBERSPACE
1970
Politeja
Cyberspace is presented as a process of data transmission and information cognition/processing in the digital domain. ...
Finally, processual ontology of cyberspace promotes resilience strategies both in the private sector as well as on national and international level. ...
This shows how different ontologies should be applied to physical (object bounded) and cyber (process based) space securities. ...
doi:10.12797/politeja.14.2017.50.09
fatcat:5wo2olsgzjg6dhqqpidi4a6wfa
Cyber Security Situational Awareness
2016
2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
Then, we have put forward a multi-level analysis framework for CSSA. ...
In a time cyber-attacks getting increasingly sophisticated and making potentially disruptive impacts, it becomes apparent that a holistic approach is fundamentally needed to handling security data effectively ...
Multi-Level Analysis Framework of CSSA From security information acquisition to building the cyber security situation model, it must be an integrated process. ...
doi:10.1109/ithings-greencom-cpscom-smartdata.2016.165
dblp:conf/ithings/Tianfield16
fatcat:bsjzygtzbreepin2mtda7sccne
An Approach to Intelligent Information Fusion in Sensor Saturated Urban Environments
2011
2011 European Intelligence and Security Informatics Conference
This paper introduces a novel sensor information fusion system enabling security and surveillance in large scale sensor saturated urban environments. ...
A distinguishing characteristic of the system is that it support seamless integration with semantic web middleware (including ontologies and inference mechanisms), which enable intelligent high-level accurate ...
ACKNOWLEDGMENT Part of this work has been carried out in the scope of the MEDUSA project (Multi sEensor Data fusion grid for Urban Situational Awareness, co-funded by the European Defense Agency (MDS-MoM-A026RTGC-C ...
doi:10.1109/eisic.2011.24
dblp:conf/eisic/DoulaverakisKKKS11
fatcat:bbhdlo5uwvcllbaovffupphtt4
Using the AMAN-DA method to generate security requirements: a case study in the maritime domain
2017
Requirements Engineering
AMAN-DA is a requirement elicitation method that reuses encapsulated knowledge in security and domain ontologies to produce security requirements specifications. ...
[Question/Problem] The main research question addressed in this paper is to what extent is AMAN-DA able to generate domain specific security requirements? ...
Acknowledgment Authors would like to thank Dr. Zeinab Hmedeh for her valuable help during the development of the AMAN-DA tool and Prof. ...
doi:10.1007/s00766-017-0279-5
fatcat:isizxoym2bf4jc4xpy4lspzvxm
AI/ML in Security Orchestration, Automation and Response: Future Research Directions
2021
Intelligent Automation and Soft Computing
, and applications in response to security incidents to empower SOC teams. ...
Security researchers and industry practitioners have proposed security orchestration, automation, and response (SOAR) solutions designed to integrate and automate the disparate security tasks, processes ...
Acknowledgement: The authors declare that there are no other contributors to the present study and therefore no acknowledgements to be made. ...
doi:10.32604/iasc.2021.016240
fatcat:4c2dgerxwzhonn3xyypyyekmjq
An ontology-oriented decision support system for emergency management based on information fusion
2015
Proceedings of the 1st ACM SIGSPATIAL International Workshop on the Use of GIS in Emergency Management - EM-GIS '15
This paper proposes a novel ontology-oriented decision support system for emergency management based on information fusion. ...
In the proposed decision support system, multi-source data are integrated as the inputs and outputs of models, which are employed to preprocess the data for decision-making supporting. ...
of people, security zone's information, exclusion zone's information, data map, walking parameter, materials information. ...
doi:10.1145/2835596.2835602
dblp:conf/gis/HanX15
fatcat:qpyjxkhi4jcx7kogi6hazwzi7a
Context-based multi-level information fusion for harbor surveillance
2015
Information Fusion
The lowest level uses an ontological model to formally represent input data and to classify harbor objects and basic situations by deductive reasoning according to the harbor regulations. ...
The higher level applies Belief-based Argumen-tation to evaluate the threat posed by suspicious vessels. ...
attempt to combine ontologies and TBM-based uncertain reasoning to implement multi-level information fusion. ...
doi:10.1016/j.inffus.2014.01.011
fatcat:h6x57el34rgq7nz5bzakvzdliu
Standardization in cyber-physical systems: The ARUM case
2015
2015 IEEE International Conference on Industrial Technology (ICIT)
A special attention is devoted to the efforts to develop a standardcompliant service-oriented multi-agent system solution within the ARUM project. ...
Cyber-physical systems concept supports the realization of the Industrie 4.0 vision towards the computerization of traditional industries, aiming to achieve intelligent and reconfigurable factories. ...
ACKNOWLEDGMENT The research leading to these results has received funding from the European Union Seventh Framework Programme FP7 ARUM project, under grant agreement n° 314056. ...
doi:10.1109/icit.2015.7125539
dblp:conf/icit2/LeitaoBPV15
fatcat:3kmp2syksrclnprqegzukxekxy
Development of an Ontology to Assist the Modeling of Accident Scenarii "Application on Railroad Transport "
[article]
2012
arXiv
pre-print
This paper presents the contribution of ontology to modeling scenarii for rail accidents through a knowledge model based on a generic ontology and domain ontology. ...
the security field. ...
McGuinness [9] An ontology defines a common vocabulary for researchers who need to share information in a domain. ...
arXiv:1203.1021v1
fatcat:h5ucw7n66bghhpcqxrsli3srui
Towards Ontological Cognitive System
[chapter]
2013
Lecture Notes in Computational Vision and Biomechanics
Future directions suggest to reinforce the multi-modal fusion of information sources and the communication with end-users. ...
The increasing ubiquitousness of digital information in our daily lives has positioned video as a favored information vehicle, and given rise to an astonishing generation of social media and surveillance ...
an extensible ontology. ...
doi:10.1007/978-94-007-0726-9_5
fatcat:kugu32atk5ahpcuppraqhhrsxi
General Requirements of a Hybrid-Modeling Framework for Cyber Security
2014
2014 IEEE Military Communications Conference
In particular, we make the case for investigating the interplay between ontological underpinnings of cyber security and cognitive mechanisms of decision making in cyber operations. ...
To this end, in this paper we focus on the requirements for building a comprehensive model of cyber analyst's decision making processes: we embrace an approach that leverages on cognitive aspects and knowledge ...
In the domain of cyber security, ontologies would include, among other things, the classification of cyber attacks, cyber incidents, and malicious and impacted software programs. ...
doi:10.1109/milcom.2014.28
fatcat:aywrxtnuzrbvlh6ncbgvxulccm
Smart City Ontologies and Their Applications: A Systematic Literature Review
2021
Sustainability
Based on the result of the review process, we also propose a classification of the sub-domains of the city addressed by the ontologies we found, and the research issues that have been considered so far ...
To this purpose, we conducted a systematic literature review finalized to presenting the ontologies, and the methods and technological systems where ontologies play a relevant role in shaping current smart ...
The knowledge graph consists of the GovDataset ontology, an upper level ontology describing the metadata, and the GovDomain ontology, a domain-specific ontology to represent the open government data content ...
doi:10.3390/su13105578
fatcat:pvesa2mc7nc7pd4jejzrcebueq
« Previous
Showing results 1 — 15 out of 8,863 results