2009 International Conference for Internet Technology and Secured Transactions, (ICITST) 2009
DOI: 10.1109/icitst.2009.5402616
|View full text |Cite
|
Sign up to set email alerts
|

Applying semantic web and user behavior analysis to enforce the intrusion detection system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…Another interesting area in terms of Information Security where varied works can be found is in using ontologies as a basis for modeling, analysing and detect-ing security issues. In those cases, mostly, ontologies are used as the knowledge base of an expert system, a representation schema or an annotation vocabulary for a complex, knowledge intensive security issue such as Infection-Malware detection/analysis [30,31] or Intrusion detection [32,33].…”
Section: Work With a Strong Focus On Securitymentioning
confidence: 99%
“…Another interesting area in terms of Information Security where varied works can be found is in using ontologies as a basis for modeling, analysing and detect-ing security issues. In those cases, mostly, ontologies are used as the knowledge base of an expert system, a representation schema or an annotation vocabulary for a complex, knowledge intensive security issue such as Infection-Malware detection/analysis [30,31] or Intrusion detection [32,33].…”
Section: Work With a Strong Focus On Securitymentioning
confidence: 99%
“…We believe this procedure places a burden on the authentication process because the only way we can validate the authentication is through people who are considered the weakest link in computer security. We can overcome some issues in human behavior, but not all [12,6].…”
Section: Introductionmentioning
confidence: 99%
“…In those cases, mostly, ontologies are used as the knowledge base of an expert system, a representation schema or an annotation vocabulary for a complex, knowledge intensive security issue such as Infection-Malware detection/analysis [4,42] or Intrusion detection [7,28].…”
Section: Work With a Strong Focus On Securitymentioning
confidence: 99%