2014
DOI: 10.1007/978-3-319-05515-2_7
|View full text |Cite
|
Sign up to set email alerts
|

Building a Knowledge Base for Expert System in Information Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(21 citation statements)
references
References 6 publications
0
21
0
Order By: Relevance
“…It should be noted that there are other related papers that are not directly reporting ontologies but methodological aspects of the formalization of knowledge, e.g. Atymtayeva et al (2014) proposes such a methodology. The categorization presented here provides an interpretation of the main aims and application purposes of the ontologies, however some of them may be used also for other purposes.…”
Section: Main Categoriesmentioning
confidence: 98%
See 1 more Smart Citation
“…It should be noted that there are other related papers that are not directly reporting ontologies but methodological aspects of the formalization of knowledge, e.g. Atymtayeva et al (2014) proposes such a methodology. The categorization presented here provides an interpretation of the main aims and application purposes of the ontologies, however some of them may be used also for other purposes.…”
Section: Main Categoriesmentioning
confidence: 98%
“…Further, it also opens different possibilities for tasks that are not based on learning from data as done in machine learning, but on the codification of expert or technical knowledge, which is known to play an important role nowadays in information security (Fenz & Ekelhart, 2009). For example, Atymtayeva et al (2014) focuses on formalizing expert knowledge on the field, as expressed in standards or other guidance documents. This interest is a due to the fact that in this domain, a considerable part of the knowledge applied by practitioners is codified in the form of best practice guidelines or knowledge bases, some of them openly shared in communities or Web sites.…”
Section: Introductionmentioning
confidence: 99%
“…If AIS considers it appropriate to conduct a paired comparison of the informativeness of attributes of cyberattack, for example, in the situation, which requires the refinement of attributes-reasons si tl , si sd and their influence on the bond of attribute-consequence ("A-CO"), the rank scale is used [5,8,24]. A degree of influence of "A" of the attack on the indicators of OBCS IS was determined as follows:…”
Section: Fig 3 Subsystems and User Interfaces Of Dssmentioning
confidence: 99%
“…When corrected manually, an expert may change his choice, assigned at the previous step of paired estimation. A heuristic algorithm is employed during automated correction [3,5].…”
Section: Fig 3 Subsystems and User Interfaces Of Dssmentioning
confidence: 99%
See 1 more Smart Citation