Filters








8,863 Hits in 4.9 sec

Improving security incidents detection for networked multilevel intelligent control systems in railway transport

Andrey Chemov, Maria Butakova, Ekaterina Karpenko, Oleg Kartashov
2016 Telfor Journal  
We use a rough sets theory to detect an abnormal activity in the considered system.  ...  Keywords -intelligent transport systems, railway control systems, rough set theory, security information and event management.  ...  The application-oriented part of MICS begins with domain ontology. An approach based on ontology is applied in cases of creation of a system with the continuous adaptation, extension and scaling.  ... 
doi:10.5937/telfor1601014c fatcat:jz5zkffm2vhvbeqv5uxfo4gl3u

An Autonomic Ontology-Based Multiagent System for Intrusion Detection in Computing Environments

Ryan Ribeiro de Azevedo, Eric Rommel Galvão Dantas, Fred Freitas, Cleyton Rodrigues, Marcelo J. Siqueira C. de Almeida, Wendell Campos Veras, Rubean Santosyi
2010 International Journal for Infonomics  
In order to address the problem of protecting computational resources, in this work we propose an autonomic model called AutoCore, constituted by a Multi-Agent system, an Intelligent Interface (CoreEditor  ...  ) and a formal ontology (CoreSec).  ...  The AutoCore makes use of CoreSec as an ontology knowledge base, which is a domain-ontology with high-level concepts for information security, giving aid the management of IT.  ... 
doi:10.20533/iji.1742.4712.2010.0019 fatcat:7po43x7bczdnxnwnsaesvfhrlq

A Security Determination-Reaction Architecture for Heterogeneous Distributed Network

B. Bhasker, Department of CSE, Malla Reddy College of Engineering and Technology, Hyderabad, India, Department of CSE, Malla Reddy College of Engineering and Technology, Hyderabad, India, Department of CSE, Malla Reddy College of Engineering and Technology, Hyderabad, India, T. Jagadish Kumar, M.V.Kamal .
2017 International Journal of Scientific Research in Computer Sciences and Engineering  
particularly applied to telecom infrastructures security.  ...  The main focus of this paper is to provide a global architectural solution built on the requirements for a reaction after alert detection mechanisms in the frame of Information Systems Security and more  ...  Ontology may be categorized as domain ontology when it concerns concepts and their relations from a same and well defined domain or top-level ontology when it concerns very general domain-independent concepts  ... 
doi:10.26438/ijsrcse/v5i5.2634 fatcat:2u5aknelcvhsxde5xejz3homhm

REDEFINING CYBERSECURITY THROUGH PROCESSUAL ONTOLOGY OF THE CYBERSPACE

Robert Siudak
1970 Politeja  
Cyberspace is presented as a process of data transmission and information cognition/processing in the digital domain.  ...  Finally, processual ontology of cyberspace promotes resilience strategies both in the private sector as well as on national and international level.  ...  This shows how different ontologies should be applied to physical (object bounded) and cyber (process based) space securities.  ... 
doi:10.12797/politeja.14.2017.50.09 fatcat:5wo2olsgzjg6dhqqpidi4a6wfa

Cyber Security Situational Awareness

Huaglory Tianfield
2016 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)  
Then, we have put forward a multi-level analysis framework for CSSA.  ...  In a time cyber-attacks getting increasingly sophisticated and making potentially disruptive impacts, it becomes apparent that a holistic approach is fundamentally needed to handling security data effectively  ...  Multi-Level Analysis Framework of CSSA From security information acquisition to building the cyber security situation model, it must be an integrated process.  ... 
doi:10.1109/ithings-greencom-cpscom-smartdata.2016.165 dblp:conf/ithings/Tianfield16 fatcat:bsjzygtzbreepin2mtda7sccne

An Approach to Intelligent Information Fusion in Sensor Saturated Urban Environments

Charalampos Doulaverakis, Nikolaos Konstantinou, Thomas Knape, Ioannis Kompatsiaris, John Soldatos
2011 2011 European Intelligence and Security Informatics Conference  
This paper introduces a novel sensor information fusion system enabling security and surveillance in large scale sensor saturated urban environments.  ...  A distinguishing characteristic of the system is that it support seamless integration with semantic web middleware (including ontologies and inference mechanisms), which enable intelligent high-level accurate  ...  ACKNOWLEDGMENT Part of this work has been carried out in the scope of the MEDUSA project (Multi sEensor Data fusion grid for Urban Situational Awareness, co-funded by the European Defense Agency (MDS-MoM-A026RTGC-C  ... 
doi:10.1109/eisic.2011.24 dblp:conf/eisic/DoulaverakisKKKS11 fatcat:bbhdlo5uwvcllbaovffupphtt4

Using the AMAN-DA method to generate security requirements: a case study in the maritime domain

Amina Souag, Raúl Mazo, Camille Salinesi, Isabelle Comyn-Wattiau
2017 Requirements Engineering  
AMAN-DA is a requirement elicitation method that reuses encapsulated knowledge in security and domain ontologies to produce security requirements specifications.  ...  [Question/Problem] The main research question addressed in this paper is to what extent is AMAN-DA able to generate domain specific security requirements?  ...  Acknowledgment Authors would like to thank Dr. Zeinab Hmedeh for her valuable help during the development of the AMAN-DA tool and Prof.  ... 
doi:10.1007/s00766-017-0279-5 fatcat:isizxoym2bf4jc4xpy4lspzvxm

AI/ML in Security Orchestration, Automation and Response: Future Research Directions

Johnson Kinyua, Lawrence Awuah
2021 Intelligent Automation and Soft Computing  
, and applications in response to security incidents to empower SOC teams.  ...  Security researchers and industry practitioners have proposed security orchestration, automation, and response (SOAR) solutions designed to integrate and automate the disparate security tasks, processes  ...  Acknowledgement: The authors declare that there are no other contributors to the present study and therefore no acknowledgements to be made.  ... 
doi:10.32604/iasc.2021.016240 fatcat:4c2dgerxwzhonn3xyypyyekmjq

An ontology-oriented decision support system for emergency management based on information fusion

Yaoci Han, Wei Xu
2015 Proceedings of the 1st ACM SIGSPATIAL International Workshop on the Use of GIS in Emergency Management - EM-GIS '15  
This paper proposes a novel ontology-oriented decision support system for emergency management based on information fusion.  ...  In the proposed decision support system, multi-source data are integrated as the inputs and outputs of models, which are employed to preprocess the data for decision-making supporting.  ...  of people, security zone's information, exclusion zone's information, data map, walking parameter, materials information.  ... 
doi:10.1145/2835596.2835602 dblp:conf/gis/HanX15 fatcat:qpyjxkhi4jcx7kogi6hazwzi7a

Context-based multi-level information fusion for harbor surveillance

Juan Gómez-Romero, Miguel A. Serrano, Jesús García, José M. Molina, Galina Rogova
2015 Information Fusion  
The lowest level uses an ontological model to formally represent input data and to classify harbor objects and basic situations by deductive reasoning according to the harbor regulations.  ...  The higher level applies Belief-based Argumen-tation to evaluate the threat posed by suspicious vessels.  ...  attempt to combine ontologies and TBM-based uncertain reasoning to implement multi-level information fusion.  ... 
doi:10.1016/j.inffus.2014.01.011 fatcat:h6x57el34rgq7nz5bzakvzdliu

Standardization in cyber-physical systems: The ARUM case

Paulo Leitao, Jose Barbosa, Maria-Eleftheria Ch. Papadopoulou, Iakovos S. Venieris
2015 2015 IEEE International Conference on Industrial Technology (ICIT)  
A special attention is devoted to the efforts to develop a standardcompliant service-oriented multi-agent system solution within the ARUM project.  ...  Cyber-physical systems concept supports the realization of the Industrie 4.0 vision towards the computerization of traditional industries, aiming to achieve intelligent and reconfigurable factories.  ...  ACKNOWLEDGMENT The research leading to these results has received funding from the European Union Seventh Framework Programme FP7 ARUM project, under grant agreement n° 314056.  ... 
doi:10.1109/icit.2015.7125539 dblp:conf/icit2/LeitaoBPV15 fatcat:3kmp2syksrclnprqegzukxekxy

Development of an Ontology to Assist the Modeling of Accident Scenarii "Application on Railroad Transport " [article]

Ahmed Maalel, Habib Hadj mabrouk, Lassad Mejri, Henda Hajjami Ben Ghezela
2012 arXiv   pre-print
This paper presents the contribution of ontology to modeling scenarii for rail accidents through a knowledge model based on a generic ontology and domain ontology.  ...  the security field.  ...  McGuinness [9] An ontology defines a common vocabulary for researchers who need to share information in a domain.  ... 
arXiv:1203.1021v1 fatcat:h5ucw7n66bghhpcqxrsli3srui

Towards Ontological Cognitive System [chapter]

Carles Fernandez, Jordi Gonzàlez, João Manuel R. S. Tavares, F. Xavier Roca
2013 Lecture Notes in Computational Vision and Biomechanics  
Future directions suggest to reinforce the multi-modal fusion of information sources and the communication with end-users.  ...  The increasing ubiquitousness of digital information in our daily lives has positioned video as a favored information vehicle, and given rise to an astonishing generation of social media and surveillance  ...  an extensible ontology.  ... 
doi:10.1007/978-94-007-0726-9_5 fatcat:kugu32atk5ahpcuppraqhhrsxi

General Requirements of a Hybrid-Modeling Framework for Cyber Security

Alessandro Oltramari, Noam Ben-Asher, Lorrie Cranor, Lujo Bauer, Nicolas Christin
2014 2014 IEEE Military Communications Conference  
In particular, we make the case for investigating the interplay between ontological underpinnings of cyber security and cognitive mechanisms of decision making in cyber operations.  ...  To this end, in this paper we focus on the requirements for building a comprehensive model of cyber analyst's decision making processes: we embrace an approach that leverages on cognitive aspects and knowledge  ...  In the domain of cyber security, ontologies would include, among other things, the classification of cyber attacks, cyber incidents, and malicious and impacted software programs.  ... 
doi:10.1109/milcom.2014.28 fatcat:aywrxtnuzrbvlh6ncbgvxulccm

Smart City Ontologies and Their Applications: A Systematic Literature Review

Antonio De Nicola, Maria Luisa Villani
2021 Sustainability  
Based on the result of the review process, we also propose a classification of the sub-domains of the city addressed by the ontologies we found, and the research issues that have been considered so far  ...  To this purpose, we conducted a systematic literature review finalized to presenting the ontologies, and the methods and technological systems where ontologies play a relevant role in shaping current smart  ...  The knowledge graph consists of the GovDataset ontology, an upper level ontology describing the metadata, and the GovDomain ontology, a domain-specific ontology to represent the open government data content  ... 
doi:10.3390/su13105578 fatcat:pvesa2mc7nc7pd4jejzrcebueq
« Previous Showing results 1 — 15 out of 8,863 results