Using Ontologies in Cybersecurity Field

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ontologies in the Health Field

Health data and knowledge had been structured through medical classifications and taxonomies long before ontologies had acquired their pivot status of the Semantic Web. Although there is no consensus on a common definition of an ontology, it is necessary to understand their main features to be able to use them in a pertinent and efficient manner for data mining purposes. This chapter introduces...

متن کامل

Ontologies in System Engineering: A Field Report

In recent years ontologies enjoyed a growing popularity outside specialized AI communities. System engineering is no exception to this trend, with ontologies being proposed as a basis for several tasks in complex industrial implements, including system design, monitoring and diagnosis. In this paper, we consider four different contributions to system engineering wherein ontologies are instrumen...

متن کامل

Linking Cybersecurity Knowledge: Cybersecurity Information Discovery Mechanism

To cope with increasing amount of cyber threats, organizations need to share cybersecurity information beyond the borders of organizations, countries, and even languages. Assorted organizations built repositories that store and provide XML-based cybersecurity information on the Internet. Among them are NVD [1], OSVDB [2], and JVN [3], and more cybersecurity information from various organization...

متن کامل

Cybersecurity in health care.

395 ware-laden e-mail, the hospital took the precautionary step of temporarily shutting down its entire e-mail system. The shutdown gave IT staff time to quarantine malicious e-mail and to notify staff of the absolute importance of not clicking links or opening attachments without being certain that they were safe. And although having no e-mail was a minor inconvenience for most employees (and ...

متن کامل

Social Cybersecurity

............................................................................................................................................... 2 ACKNOWLEDGEMENTS ........................................................................................................................ 3 CHAPTER 1: INTRODUCTION AND MOTIVATION ...........................................................................

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Informatica Economica

سال: 2017

ISSN: 1453-1305,1842-8088

DOI: 10.12948/issn14531305/21.3.2017.01