From Data to Knowledge Engineering for Cybersecurity

被引:0
|
作者
Simari, Gerardo, I [1 ,2 ,3 ]
机构
[1] Univ Nacl Sur UNS, Dept Comp Sci & Engn, Bahia Blanca, Buenos Aires, Argentina
[2] UNS, Inst Comp Sci & Engn, CONICET, Bahia Blanca, Buenos Aires, Argentina
[3] Arizona State Univ, Tempe, AZ 85281 USA
基金
欧盟地平线“2020”;
关键词
LOGIC;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data present in a wide array of platforms that are part of today's information systems lies at the foundation of many decision making processes, as we have now come to depend on social media, videos, news, forums, chats, ads, maps, and many other data sources for our daily lives. In this article, we first discuss how such data sources are involved in threats to systems' integrity, and then how they can be leveraged along with knowledge-based tools to tackle a set of challenges in the cybersecurity domain Finally, we present a brief discussion of our roadmap for research and development in the near future to address the set of ever-evolving cyber threats that our systems face every day.
引用
收藏
页码:6403 / 6407
页数:5
相关论文
共 50 条
  • [21] KNOWLEDGE MODELS REUSE FOR DATA ENGINEERING
    Trinkunas, Justas
    Vasilecas, Olegas
    INFORMATION TECHNOLOGIES' 2009, 2009, : 328 - 336
  • [22] Cybersecurity: From ad hoc patching to lifecycle of software engineering
    Chittister, Clyde G.
    Haimes, Yacov Y.
    JOURNAL OF HOMELAND SECURITY AND EMERGENCY MANAGEMENT, 2006, 3 (04)
  • [23] Defining Social Engineering in Cybersecurity
    Wang, Zuoguang
    Sun, Limin
    Zhu, Hongsong
    IEEE ACCESS, 2020, 8 : 85094 - 85115
  • [24] Toward a Unified Cybersecurity Knowledge Graph: Leveraging Ontologies and Open Data Sources
    Boyer, Adam
    Dogdu, Erdogan
    Choupani, Roya
    Watson, Jason S.
    Sanchez, Diego
    Ametu, Alexander
    RECENT ADVANCES IN NEXT-GENERATION DATA SCIENCE, SDSC 2024, 2024, 2158 : 17 - 33
  • [25] Cybersecurity challenges in the knowledge economy
    Ursache, Vlad-Mihai
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON BUSINESS EXCELLENCE, 2022, 16 (01): : 121 - 129
  • [26] A lesson for software engineering from knowledge engineering
    Debenham, John
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2003, 2736 : 569 - 578
  • [27] A lesson for software engineering from knowledge engineering
    Debenham, J
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2003, 2736 : 569 - 578
  • [28] Enhancing Data-Driven Models with Knowledge from Engineering Models in Manufacturing
    Auris, Felix
    Fisch, Jessica
    Brandl, Michael
    Suess, Sebastian
    Soubar, Abedalhameed
    Diedrich, Christian
    2018 IEEE 14TH INTERNATIONAL CONFERENCE ON AUTOMATION SCIENCE AND ENGINEERING (CASE), 2018, : 653 - 656
  • [29] Extracting Cybersecurity Related Linked Data from Text
    Joshi, Arnav
    Lal, Ravendar
    Finin, Tim
    Joshi, Anupam
    2013 IEEE SEVENTH INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC 2013), 2013, : 252 - 259
  • [30] A Characterization of Cybersecurity Posture from Network Telescope Data
    Zhan, Zhenxin
    Xu, Maochao
    Xu, Shouhuai
    TRUSTED SYSTEMS, INTRUST 2014, 2015, 9473 : 105 - 126