2023
DOI: 10.1016/j.chb.2022.107520
|View full text |Cite
|
Sign up to set email alerts
|

An ontology-driven framework for knowledge representation of digital extortion attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 62 publications
0
0
0
Order By: Relevance
“…The proposed framework addresses each field's challenges and outlines the proposed solutions. (1) Cyber security [22,23,24] explored cybersecurity threats in various business spheres, proposing an ontology-driven framework for addressing challenges. These studies focused on various aspects of cybersecurity, aiming to provide a comprehensive solution.…”
Section: Rq1 Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed framework addresses each field's challenges and outlines the proposed solutions. (1) Cyber security [22,23,24] explored cybersecurity threats in various business spheres, proposing an ontology-driven framework for addressing challenges. These studies focused on various aspects of cybersecurity, aiming to provide a comprehensive solution.…”
Section: Rq1 Discussionmentioning
confidence: 99%
“…They propose knowledge graphs for security modeling and an ontology classification framework for cybersecurity terminology validation, addressing threats and attacks on large organizations. [24] argue that ontologies, designed to address domain knowledge questions, can help automate threat modelling by simplifying data creation. They believe that ontologies are the solution to cyber security challenges, as they address the lack of context in the data collected.…”
Section: Rq1 Discussionmentioning
confidence: 99%
“…These attacks cost organizations a lot. In 2015, cyberattacks cost 3 trillion U.S. dollars worldwide, 5 trillion in 2017, and 6 trillion in 2021 [61][62][63][64][65][66][67][68]. Indeed, these figures highlight the critical impact of cyberattacks on organizational stability and sustainability.…”
Section: Cyber Security Threats In Educational Institutionsmentioning
confidence: 99%
“…Graph-based representations are mostly beneficial because they can portray the complex relationships between different entities involved in complex attacks; they can be used by scholars to model the propagation of malware through networks of targeted systems [11] [7]. Many scholars have tried to use knowledge representation techniques in many fields within cybersecurity; for instance, the study by some scholars [11][12][13] have reported the development of ontologies for cyberattacks' modelling on cyber supply chain systems, where these ontologies serve as a structured approach for depicting the relationships between the involved entities involved in the attacks. The nature of these cyber supply chain attacks can be understood via analysis of these ontologies.…”
Section: Previous Studiesmentioning
confidence: 99%