2018
DOI: 10.1007/978-3-319-76941-7_81
|View full text |Cite
|
Sign up to set email alerts
|

SIREN - Security Information Retrieval and Extraction eNgine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…Given the extent of effort and cost involved, access to domain content and ability to process text with advanced natural language processing (NLP) techniques and ML models on powerful IT infrastructure opens up research opportunities to construct and manage ontologies. The information security ontologies can be constructed or enriched from unstructured text available on public forums, vulnerability databases such as National Vulnerability Database (NVD) 3 and other information security processing systems [7], [8] sources. Also, standards and guidelines from ISO/IEC [9], NIST from US, ENISA from European Nation, Cloud Security Alliance (CSA) and others to protect confidentiality, integrity and availability of IT assets, contain embedded concepts.…”
Section: Introductionmentioning
confidence: 99%
“…Given the extent of effort and cost involved, access to domain content and ability to process text with advanced natural language processing (NLP) techniques and ML models on powerful IT infrastructure opens up research opportunities to construct and manage ontologies. The information security ontologies can be constructed or enriched from unstructured text available on public forums, vulnerability databases such as National Vulnerability Database (NVD) 3 and other information security processing systems [7], [8] sources. Also, standards and guidelines from ISO/IEC [9], NIST from US, ENISA from European Nation, Cloud Security Alliance (CSA) and others to protect confidentiality, integrity and availability of IT assets, contain embedded concepts.…”
Section: Introductionmentioning
confidence: 99%