2022
DOI: 10.3390/su14148877
|View full text |Cite
|
Sign up to set email alerts
|

Deep Model-Based Security-Aware Entity Alignment Method for Edge-Specific Knowledge Graphs

Abstract: This paper proposes a deep model-based entity alignment method for the edge-specific knowledge graphs (KGs) to resolve the semantic heterogeneity between the edge systems’ data. To do so, this paper first analyzes the edge-specific knowledge graphs (KGs) to find unique characteristics. The deep model-based entity alignment method is developed based on their unique characteristics. The proposed method performs the entity alignment using a graph which is not topological but data-centric, to reflect the character… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 58 publications
(81 reference statements)
0
3
0
Order By: Relevance
“…For each CVE list, the similarity values for the security newsgroups were added together and reflected in the security vulnerability similarity (SVS), as shown in Equation (3).…”
Section: Updates Andmentioning
confidence: 99%
See 1 more Smart Citation
“…For each CVE list, the similarity values for the security newsgroups were added together and reflected in the security vulnerability similarity (SVS), as shown in Equation (3).…”
Section: Updates Andmentioning
confidence: 99%
“…In addition, they offer the great advantage of analyzing large amounts of data, such as security logs and network traffic, to detect previously undiscovered threats. In particular, knowledge-based intelligent security systems using ontology or knowledge graph technology are crucial for deepening the understanding of the meaning of and relationships between security data and detecting and responding to complex threats more effectively [3]. Knowledge-based security technologies formally define entities, such as attack types, vulnerabilities, and attackers, and their relationships.…”
Section: Introductionmentioning
confidence: 99%
“…Large-scale knowledge graphs are constructed using information that can be accessed through the web, such as news, blogs, social media, and Wikipedia. These knowledge graphs are used as key resources for services in a variety of application fields, such as recommendation systems, QA, and conversation systems [10,11]. Automatic knowledge graph generation and expansion methods are essential techniques for extracting new knowledge from various and vastly added data and continuously updating existing knowledge graphs.…”
Section: Automatic Knowledge Graph Generation and Expansionmentioning
confidence: 99%