2023
DOI: 10.1016/j.compeleceng.2023.108660
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity knowledge graph enabled attack chain detection for cyber-physical systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Qi et al [22] introduced knowledge graphs into the detection of composite cyberattacks and constructed a cybersecurity knowledge graph based on known attack knowledge. They conducted a correlation analysis of real-time data to reconstruct the attack process.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Qi et al [22] introduced knowledge graphs into the detection of composite cyberattacks and constructed a cybersecurity knowledge graph based on known attack knowledge. They conducted a correlation analysis of real-time data to reconstruct the attack process.…”
Section: Related Workmentioning
confidence: 99%
“…Qi [22] Knowledge graph for composite cyber-attacks Enhances graphs with dynamic clustering and path queries; high computational load.…”
Section: Contribution Key Featuresmentioning
confidence: 99%
“…As a result, those mechanisms cannot e ciently ensure the security of BCoT against complicated attacks [11,12]. The security mechanisms based on cybersecurity knowledge can extract threat intelligence information with ne granularity [13,14].…”
Section: Introductionmentioning
confidence: 99%
“…However, recent studies [5][6][7][8][9] have shown that DNNbased SRSs are vulnerable to adversarial attacks. Attackers can add imperceptible small noise to the original audio, which can cause a well-performing SRS to produce incorrect identification results.…”
Section: Introductionmentioning
confidence: 99%