A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Filling a Knowledge Base for Expert System in Information Security
2019
IOP Conference Series: Materials Science and Engineering
Based on the standards, methods for filling the knowledge base for the expert system and a model for the functioning of this system are proposed. ...
As a result, with a help of a specific user interaction algorithm with the output mechanism, it is possible to segregate the industry component in information security assessment process that will allow ...
Conclusion The proposed algorithm for filling the knowledge base, as well as building an expert system, allows for a comprehensive assessment of the information security of an enterprise taking into account ...
doi:10.1088/1757-899x/618/1/012085
fatcat:2b3mrzyiifhenfcgqq2bs45qg4
Ontology Based RT-Delphi with Explanation Capabilities
2014
IAES International Journal of Artificial Intelligence (IJ-AI)
We applied the developed approach in to two crucial important case studies in Egypt, which are food security and water security.</p> ...
In addition, the current RT-Delphi ignores the explanation capabilities for consensus results, which it is vital for policy/decision makers to be more confidence. ...
retrieval and manipulation of information and knowledge that can provided for building a knowledge repository for a domain. ...
doi:10.11591/ijai.v3.i2.pp57-63
fatcat:w7gupx3m2fc4dlk5qh62q6by4y
A Knowledge-based Expert System for Supporting Security in Software Engineering Projects
2022
International Journal of Advanced Computer Science and Applications
The authors found so a solution for the replacement of the knowledge of the security engineer through the construction of an intelligent knowledge-based system, which provides the software developer with ...
The framework and the expert system are tested on a variety of software projects, where a significant improvement of security in each phase of the software development process is achieved. ...
ACKNOWLEDGMENT The authors are grateful to the Applied Science Private University, Amman, Jordan, for the full financial support granted to this research. ...
doi:10.14569/ijacsa.2022.0130149
fatcat:xj3sz3ttijb53jstxxlwykysvy
Structural Analysis with Knowledge-based MICMAC Approach
2014
International Journal of Computer Applications
In addition, it was 15 and 25 experts participate in food security and water security cases. ...
In this paper, we develop a knowledge-based structural analysis approach that based on integrating of RT-Delphi, structural analysis, knowledgebased and explanation modeling capabilities. ...
Also, ontology KB Model provides to build a knowledge repository for a specific domain. ...
doi:10.5120/14985-3290
fatcat:a633bulnlrhsldbvdl6u4minam
Artificial intelligence design research on the cyber security penetration testing of power grid enterprises
2019
IOP Conference Series: Earth and Environment
This paper introduces the key components of Artificial Intelligence (AI) expert system. It studies the main application of AI technology in network security. ...
The AI penetration test expert system is designed, and the implementation of the system is elaborated. ...
The expert system is an intelligent computer program system, which contains a large number of experts and knowledge in a certain field, and can use the knowledge and problem solving methods of human experts ...
doi:10.1088/1755-1315/354/1/012104
fatcat:7uku4rdcozd5jg6ffzui36uh6a
A qualitative analysis of an ontology based issue resolution system for cyber attack management
2014
The 4th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent
We validate our IRS Ontology using qualitative study of security expert professionals and highlight future work intended to simulate the IRS in a virtual attack test environment. ...
The issue resolution system (IRS) facilitates attack discovery and suggestive defenses for a small to medium sized organizations. ...
Ransbotham and Mitra [17] provide insight into a conceptual model of paths to information security compromise, in which security experts are elicited for experiential knowledge in relaton to organizational ...
doi:10.1109/cyber.2014.6917483
fatcat:l3yl5456ezamlid4a53n4nucxe
Knowledge Base for an Intelligent System in order to Identify Security Requirements for Government Agencies Software Projects
2016
MATEC Web of Conferences
The knowledge base built is formed by an ontology developed collaboratively by experts in information security. ...
CIBERREQ is an intelligent knowledge-based system used for the identification and specification of security requirements in the software development cycle or in the software acquisition. ...
In section IV we describe the ontology used to build the knowledge base for the proposed system and shows how the system interacts with the knowledge base. ...
doi:10.1051/matecconf/20167603012
fatcat:rbd767hmhzhfzjl4gps3gpsfpy
Building Expert Profiles Models Applying Semantic Web Technologies
[chapter]
2012
Security Enhanced Applications for Information Systems
Building Expert Profiles Models Applying Semantic Web Technologies, Security Enhanced Applications for Information Systems, Dr. ...
Security Enhanced Applications for Information Systems
www.intechopen.com ...
doi:10.5772/48020
fatcat:2q7okqalzvdhvmtegw2qkane2q
Theory of modern penetration testing expert system
2017
Системи обробки інформації
Methodologies of automated planning and partially observable Markov decision processes are suggested in order to improve results and build flexible security evaluation expert system. ...
This article discusses developing of the security expert system by using new methods for efficient and automated penetration testing. ...
In our experiments, this information is estimated based on expert knowledge or experience. ...
doi:10.30748/soi.2017.148.25
fatcat:3gxjimvx5nhq3aow5cmjlkyhi4
Building automation by intelligent control of its environment
2007
The Renewable Energies and Power Quality Journal (RE&PQJ)
The rules of automation in this system will allow for a better integration of devices and will facilitate their interaction with the elements that define the operation of an intelligent building. ...
As it is shown in this article, the use of technologies based on artificial intelligence to model and control the behavior of building automation systems contributes to optimize its performance in terms ...
Gerardo Bar, who made the preliminary project of the building. ...
doi:10.24084/repqj05.204
fatcat:osahsnfx7nbjpgbfznex73ao3e
Information Security Risk Assessment of Smartphones using Bayesian Networks
2016
Journal of Cyber Security and Mobility
The primary research method is a knowledge-based approach to build a causal Bayesian network model of information security risks and consequences. ...
This study comprises an information security risk assessment of smartphone use in Finland using Bayesian networks. ...
The purpose of the first stage is to gather enough information to build a qualitative model of the information security risks and consequences, i.e. the graphical BN structure in which nodes represent ...
doi:10.13052/jcsm2245-1439.424
fatcat:g446fbjblfbfzabn5sxrodoavu
Special Section Guest Editor's Introduction: Research Surveys On Building Systems With Knowledge And Data Engineering Techniques
1997
IEEE Transactions on Knowledge and Data Engineering
This composite representation can be used as the basis for building a knowledge-based system that supports the decision situation. ...
INTRODUCTION XPERIENCE using knowledge and data engineering techniques for building large and complex systems is becoming widespread. ...
His research interests include engineering database systems, objectoriented systems, and database security. ...
doi:10.1109/tkde.1997.634746
fatcat:jhs42j3ebzg7rpz62htnbuwf3i
A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain
[chapter]
2020
Lecture Notes in Computer Science
In this paper we conduct a systematic literature review to find which information sources that have been used in power system threat modeling research. ...
There are several different sources for this information. ...
These experts are not necessarily experts in security but they are rather experts in the power systems domain. There is one exception and that is one article that used hacking knowledge [15] . ...
doi:10.1007/978-3-030-58295-1_4
fatcat:5bgvrktyofesneoo4dlng4wvpq
An Exploration on the Developing of Expert System in Transport Engineering
2017
MATEC Web of Conferences
Two main components categorized for this paper are knowledge base obtained from previous study and a comparative study between the expert system to get a summary of the best inference engine, knowledge ...
This paper aims to determine the expert system developed from past research observations. This overview of expert system indicates the use of system which have slight affects on the results. ...
engineer codes the knowledge explicitly in the knowledge base. iii) The expert evaluates the expert system and gives a critique to the knowledge engineer. ...
doi:10.1051/matecconf/201710309014
fatcat:al5ie7upijftbeckhv36w2fixm
A Methodology Based on an Expert Fuzzy System for the Selection of the Architecture, Technology and Characteristics of a Domotics System
2003
The Renewable Energies and Power Quality Journal (RE&PQJ)
The set of criteria are obtained from the knowledge of experts, using a fuzzy logic expert system (ES). ...
That Methodology for the Selection and Development of Domotics Projects is based on well defined phases or sequences, and will allow the direct and unambiguous selection of the best domotics systems for ...
Just than an Expert System, we better must talk about a Knowledge Based System, because it uses the present natural knowledge in this subject. ...
doi:10.24084/repqj01.381
fatcat:yicfkmnjnjfmxfy6pvw77fvava
« Previous
Showing results 1 — 15 out of 301,675 results