301,675 Hits in 7.5 sec

Filling a Knowledge Base for Expert System in Information Security

N Kireeva, I Pozdnyak, A Gazizulina
2019 IOP Conference Series: Materials Science and Engineering  
Based on the standards, methods for filling the knowledge base for the expert system and a model for the functioning of this system are proposed.  ...  As a result, with a help of a specific user interaction algorithm with the output mechanism, it is possible to segregate the industry component in information security assessment process that will allow  ...  Conclusion The proposed algorithm for filling the knowledge base, as well as building an expert system, allows for a comprehensive assessment of the information security of an enterprise taking into account  ... 
doi:10.1088/1757-899x/618/1/012085 fatcat:2b3mrzyiifhenfcgqq2bs45qg4

Ontology Based RT-Delphi with Explanation Capabilities

Ahmed Omran, Motaz Khorshid
2014 IAES International Journal of Artificial Intelligence (IJ-AI)  
We applied the developed approach in to two crucial important case studies in Egypt, which are food security and water security.</p>  ...  In addition, the current RT-Delphi ignores the explanation capabilities for consensus results, which it is vital for policy/decision makers to be more confidence.  ...  retrieval and manipulation of information and knowledge that can provided for building a knowledge repository for a domain.  ... 
doi:10.11591/ijai.v3.i2.pp57-63 fatcat:w7gupx3m2fc4dlk5qh62q6by4y

A Knowledge-based Expert System for Supporting Security in Software Engineering Projects

Ahmad Azzazi, Mohammad Shkoukani
2022 International Journal of Advanced Computer Science and Applications  
The authors found so a solution for the replacement of the knowledge of the security engineer through the construction of an intelligent knowledge-based system, which provides the software developer with  ...  The framework and the expert system are tested on a variety of software projects, where a significant improvement of security in each phase of the software development process is achieved.  ...  ACKNOWLEDGMENT The authors are grateful to the Applied Science Private University, Amman, Jordan, for the full financial support granted to this research.  ... 
doi:10.14569/ijacsa.2022.0130149 fatcat:xj3sz3ttijb53jstxxlwykysvy

Structural Analysis with Knowledge-based MICMAC Approach

Ahmed Omran, Motaz Khorish, Mohamed Saleh
2014 International Journal of Computer Applications  
In addition, it was 15 and 25 experts participate in food security and water security cases.  ...  In this paper, we develop a knowledge-based structural analysis approach that based on integrating of RT-Delphi, structural analysis, knowledgebased and explanation modeling capabilities.  ...  Also, ontology KB Model provides to build a knowledge repository for a specific domain.  ... 
doi:10.5120/14985-3290 fatcat:a633bulnlrhsldbvdl6u4minam

Artificial intelligence design research on the cyber security penetration testing of power grid enterprises

X D Sun, Z Ren, P W Yang, J Li, H Y Chen, T Q Liu
2019 IOP Conference Series: Earth and Environment  
This paper introduces the key components of Artificial Intelligence (AI) expert system. It studies the main application of AI technology in network security.  ...  The AI penetration test expert system is designed, and the implementation of the system is elaborated.  ...  The expert system is an intelligent computer program system, which contains a large number of experts and knowledge in a certain field, and can use the knowledge and problem solving methods of human experts  ... 
doi:10.1088/1755-1315/354/1/012104 fatcat:7uku4rdcozd5jg6ffzui36uh6a

A qualitative analysis of an ontology based issue resolution system for cyber attack management

Chris B. Simmons, Sajjan G. Shiva, Lakisha L. Simmons
2014 The 4th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent  
We validate our IRS Ontology using qualitative study of security expert professionals and highlight future work intended to simulate the IRS in a virtual attack test environment.  ...  The issue resolution system (IRS) facilitates attack discovery and suggestive defenses for a small to medium sized organizations.  ...  Ransbotham and Mitra [17] provide insight into a conceptual model of paths to information security compromise, in which security experts are elicited for experiential knowledge in relaton to organizational  ... 
doi:10.1109/cyber.2014.6917483 fatcat:l3yl5456ezamlid4a53n4nucxe

Knowledge Base for an Intelligent System in order to Identify Security Requirements for Government Agencies Software Projects

Beltrán G. Adán, Lombana C. Cristhian, Calvo L. Mario, Ordoñez S. Sonia, Caviativa C. Yaneth, Garcés Jairo, N. Mastorakis, V. Mladenov, A. Bulucea
2016 MATEC Web of Conferences  
The knowledge base built is formed by an ontology developed collaboratively by experts in information security.  ...  CIBERREQ is an intelligent knowledge-based system used for the identification and specification of security requirements in the software development cycle or in the software acquisition.  ...  In section IV we describe the ontology used to build the knowledge base for the proposed system and shows how the system interacts with the knowledge base.  ... 
doi:10.1051/matecconf/20167603012 fatcat:rbd767hmhzhfzjl4gps3gpsfpy

Building Expert Profiles Models Applying Semantic Web Technologies [chapter]

Valentina Janev, Sanja Vrane
2012 Security Enhanced Applications for Information Systems  
Building Expert Profiles Models Applying Semantic Web Technologies, Security Enhanced Applications for Information Systems, Dr.  ...  Security Enhanced Applications for Information Systems  ... 
doi:10.5772/48020 fatcat:2q7okqalzvdhvmtegw2qkane2q

Theory of modern penetration testing expert system

Я.Я. Стефінко, А.З. Піскозуб
2017 Системи обробки інформації  
Methodologies of automated planning and partially observable Markov decision processes are suggested in order to improve results and build flexible security evaluation expert system.  ...  This article discusses developing of the security expert system by using new methods for efficient and automated penetration testing.  ...  In our experiments, this information is estimated based on expert knowledge or experience.  ... 
doi:10.30748/soi.2017.148.25 fatcat:3gxjimvx5nhq3aow5cmjlkyhi4

Building automation by intelligent control of its environment

Enrique A. Sierra, Alejandro A. Hossian, Carlos V.M. Labriola, Ramón Garcia Martinez
2007 The Renewable Energies and Power Quality Journal (RE&PQJ)  
The rules of automation in this system will allow for a better integration of devices and will facilitate their interaction with the elements that define the operation of an intelligent building.  ...  As it is shown in this article, the use of technologies based on artificial intelligence to model and control the behavior of building automation systems contributes to optimize its performance in terms  ...  Gerardo Bar, who made the preliminary project of the building.  ... 
doi:10.24084/repqj05.204 fatcat:osahsnfx7nbjpgbfznex73ao3e

Information Security Risk Assessment of Smartphones using Bayesian Networks

Kristian Herland, Heikki H�mm�inen, Pekka Kekolahti
2016 Journal of Cyber Security and Mobility  
The primary research method is a knowledge-based approach to build a causal Bayesian network model of information security risks and consequences.  ...  This study comprises an information security risk assessment of smartphone use in Finland using Bayesian networks.  ...  The purpose of the first stage is to gather enough information to build a qualitative model of the information security risks and consequences, i.e. the graphical BN structure in which nodes represent  ... 
doi:10.13052/jcsm2245-1439.424 fatcat:g446fbjblfbfzabn5sxrodoavu

Special Section Guest Editor's Introduction: Research Surveys On Building Systems With Knowledge And Data Engineering Techniques

D.L. Spooner
1997 IEEE Transactions on Knowledge and Data Engineering  
This composite representation can be used as the basis for building a knowledge-based system that supports the decision situation.  ...  INTRODUCTION XPERIENCE using knowledge and data engineering techniques for building large and complex systems is becoming widespread.  ...  His research interests include engineering database systems, objectoriented systems, and database security.  ... 
doi:10.1109/tkde.1997.634746 fatcat:jhs42j3ebzg7rpz62htnbuwf3i

A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain [chapter]

Engla Ling, Robert Lagerström, Mathias Ekstedt
2020 Lecture Notes in Computer Science  
In this paper we conduct a systematic literature review to find which information sources that have been used in power system threat modeling research.  ...  There are several different sources for this information.  ...  These experts are not necessarily experts in security but they are rather experts in the power systems domain. There is one exception and that is one article that used hacking knowledge [15] .  ... 
doi:10.1007/978-3-030-58295-1_4 fatcat:5bgvrktyofesneoo4dlng4wvpq

An Exploration on the Developing of Expert System in Transport Engineering

Shuhairy Norhisham, Amiruddin Ismail, Muhamad Nazri Borhan, Herda Yati Katman, M.J. Zainorizuan, L. Yee Yong, L. Alvin John Meng Siang, O. Mohamad Hanifi, R. Siti Nazahiyah, A. Mohd Shalahuddin
2017 MATEC Web of Conferences  
Two main components categorized for this paper are knowledge base obtained from previous study and a comparative study between the expert system to get a summary of the best inference engine, knowledge  ...  This paper aims to determine the expert system developed from past research observations. This overview of expert system indicates the use of system which have slight affects on the results.  ...  engineer codes the knowledge explicitly in the knowledge base. iii) The expert evaluates the expert system and gives a critique to the knowledge engineer.  ... 
doi:10.1051/matecconf/201710309014 fatcat:al5ie7upijftbeckhv36w2fixm

A Methodology Based on an Expert Fuzzy System for the Selection of the Architecture, Technology and Characteristics of a Domotics System

R. Mayo Bayón, F. Mateos Martín, L. Reina Ortega, B. Fanjul Viña, A. Robles Álvarez, A.M. López Rodríguez
2003 The Renewable Energies and Power Quality Journal (RE&PQJ)  
The set of criteria are obtained from the knowledge of experts, using a fuzzy logic expert system (ES).  ...  That Methodology for the Selection and Development of Domotics Projects is based on well defined phases or sequences, and will allow the direct and unambiguous selection of the best domotics systems for  ...  Just than an Expert System, we better must talk about a Knowledge Based System, because it uses the present natural knowledge in this subject.  ... 
doi:10.24084/repqj01.381 fatcat:yicfkmnjnjfmxfy6pvw77fvava
« Previous Showing results 1 — 15 out of 301,675 results