2023
DOI: 10.1109/tsc.2021.3113272
|View full text |Cite
|
Sign up to set email alerts
|

Semantically Rich Framework to Automate Cyber Insurance Services

Abstract: With the rapid enhancements in technology and the adoption of web services, there has been a significant increase in cyber threats faced by organizations in cyberspace. It has become essential to get financial cover to mitigate the expenses due to a security incident. Organizations want to purchase adequate cyber insurance to safeguard against the third-party services they use. However, cyber insurance policies describe their coverages and exclusions using legal jargon that can be difficult to comprehend. Pars… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…For example, Mittal et al developed CyberTwitter, which mines threat intelligence from Twitter and generates actionable alerts for cybersecurity threats and exploits [19]. Similar methods have been developed that leverage a Cybersecurity Knowledge Graph (CKG) to represent and store cybersecurity intelligence to be used as training data for AI-based cybersecurity systems, or from extraction or ingestion pipelines [14]- [18], [24], [25].…”
Section: Related Work a Leveraging Textual Cybersecurity Datamentioning
confidence: 99%
“…For example, Mittal et al developed CyberTwitter, which mines threat intelligence from Twitter and generates actionable alerts for cybersecurity threats and exploits [19]. Similar methods have been developed that leverage a Cybersecurity Knowledge Graph (CKG) to represent and store cybersecurity intelligence to be used as training data for AI-based cybersecurity systems, or from extraction or ingestion pipelines [14]- [18], [24], [25].…”
Section: Related Work a Leveraging Textual Cybersecurity Datamentioning
confidence: 99%
“…The supervised model is a feedforward neural network and it produces an entity-relationship set as an output based on an underlying UCO ontology [18]. Some dependent systems include [6], [16], [19]- [27]. The output entity relationships are constructed using manyto-many, many-to-one, and one-to-one relations.…”
Section: B Relationship Extractionmentioning
confidence: 99%
“…The associate editor coordinating the review of this manuscript and approving it for publication was Mansoor Ahmed . [3], [4], [5], [6], [7], [8], [9], [10], [11]. AI-and ML-assisted cybersecurity offers data-driven automation that could enable security systems to identify and respond to cyber threats in real time.…”
Section: Introductionmentioning
confidence: 99%