From Data to Knowledge Engineering for Cybersecurity

被引:0
|
作者
Simari, Gerardo, I [1 ,2 ,3 ]
机构
[1] Univ Nacl Sur UNS, Dept Comp Sci & Engn, Bahia Blanca, Buenos Aires, Argentina
[2] UNS, Inst Comp Sci & Engn, CONICET, Bahia Blanca, Buenos Aires, Argentina
[3] Arizona State Univ, Tempe, AZ 85281 USA
基金
欧盟地平线“2020”;
关键词
LOGIC;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data present in a wide array of platforms that are part of today's information systems lies at the foundation of many decision making processes, as we have now come to depend on social media, videos, news, forums, chats, ads, maps, and many other data sources for our daily lives. In this article, we first discuss how such data sources are involved in threats to systems' integrity, and then how they can be leveraged along with knowledge-based tools to tackle a set of challenges in the cybersecurity domain Finally, we present a brief discussion of our roadmap for research and development in the near future to address the set of ever-evolving cyber threats that our systems face every day.
引用
收藏
页码:6403 / 6407
页数:5
相关论文
共 50 条
  • [31] Data Mining and Knowledge Discovery in Industrial Engineering
    Zhao, Jun
    Pedrycz, Witold
    Senatore, Sabrina
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [32] Knowledge discovery process for scientific and engineering data
    Barrios, LJ
    Rudolph, S
    DATA MINING AND KNOWLEDGE DISCOVERY: THEORY, TOOLS AND TECHNOLOGY IV, 2002, 4730 : 118 - 125
  • [33] Scientific Data and Knowledge Management in Aerospace Engineering
    Schreiber, Andreas
    Ruehmkorf, Jens
    Seider, Doreen
    2009 THIRD INTERNATIONAL CONFERENCE ON ADVANCED ENGINEERING COMPUTING AND APPLICATIONS IN SCIENCES (ADVCOMP 2009), 2009, : 111 - 116
  • [34] An experience of engineering enterprise data and process knowledge
    Castano, S
    De Antonellis, V
    Fugini, MG
    Maio, F
    11TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATION, PROCEEDINGS, 2000, : 789 - 793
  • [35] Cybersecurity and Data Science
    Szczypiorski, Krzysztof
    ELECTRONICS, 2022, 11 (15)
  • [36] Mitigating Social Engineering for Improved Cybersecurity
    Osuagwu, E. U.
    Chukwudebe, G. A.
    Salihu, T.
    Chukwudebe, V. N.
    2015 INTERNATIONAL CONFERENCE ON CYBERSPACE (CYBER-ABUJA), 2015, : 91 - 100
  • [37] The Role of Cybersecurity Knowledge and Awareness in Cybersecurity Intention and Behavior in the United States
    Lee, Claire Seungeun
    Chua, Yi Ting
    CRIME & DELINQUENCY, 2024, 70 (09) : 2250 - 2277
  • [38] Creating Cybersecurity Knowledge Graphs From Malware After Action Reports
    Piplai, Aritran
    Mittal, Sudip
    Joshi, Anupam
    Finin, Tim
    Holt, James
    Zak, Richard
    IEEE ACCESS, 2020, 8 : 211691 - 211703
  • [39] Data-Driven Cybersecurity Knowledge Graph Construction for Industrial Control System Security
    Shen, Guowei
    Wang, Wanling
    Mu, Qilin
    Pu, Yanhong
    Qin, Ya
    Yu, Miao
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [40] Policy dimensions of cybersecurity engineering challenges
    Schneider, Fred B.
    Millett, Lynette I.
    Bridge, 1600, 49 (03): : 33 - 39