An Ontological Knowledge Base for Cyber Network Attack Planning
Պահպանված է:
| Հրատարակված է: | International Conference on Cyber Warfare and Security (2015), p. 69-79 |
|---|---|
| Հիմնական հեղինակ: | |
| Այլ հեղինակներ: | , , |
| Հրապարակվել է: |
Academic Conferences International Limited
|
| Խորագրեր: | |
| Առցանց հասանելիություն: | Citation/Abstract Full Text Full Text - PDF |
| Ցուցիչներ: |
Չկան պիտակներ, Եղեք առաջինը, ով նշում է այս գրառումը!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 1781335902 | ||
| 003 | UK-CbPIL | ||
| 035 | |a 1781335902 | ||
| 045 | 2 | |b d20150101 |b d20151231 | |
| 084 | |a 142229 |2 nlm | ||
| 100 | 1 | |a Chan, Peter | |
| 245 | 1 | |a An Ontological Knowledge Base for Cyber Network Attack Planning | |
| 260 | |b Academic Conferences International Limited |c 2015 | ||
| 513 | |a Feature | ||
| 520 | 3 | |a In modern warfare it is no longer sufficient to only focus on physical attacks and counter-measures; the threat against cyber networks is becoming increasingly significant. Modern military forces have to provide counter measures against these growing threats in the cyberspace. These forces thus find themselves in the position where they need the capability to perform cyber operations. This paper presents a Network Attack Planning ontology which is aimed at providing support for military cyber operations. The cyber network operation domain is growing at a rapid rate and involves an ever increasing volume of associated information. Semantic technologies can contribute towards the intelligent processing of information in this complex problem area. An ontology enables the representation of semantic information and automated reasoning that can support the complexity of planning cyber operations. It also contributes towards the sharing of information and the creation and maintenance of a common vocabulary. The inferences that can be made with the automated reasoning capabilities of ontologies provide a unique insight into the relationships between network targets and attacks that could be launched against them. | |
| 653 | |a Ontology | ||
| 653 | |a Aircraft | ||
| 653 | |a Semantics | ||
| 653 | |a Relational data bases | ||
| 653 | |a Threats | ||
| 653 | |a Semantic web | ||
| 653 | |a Web Ontology Language-OWL | ||
| 653 | |a Knowledge base | ||
| 653 | |a Internet | ||
| 653 | |a Information processing | ||
| 653 | |a Military operations | ||
| 653 | |a Armed forces | ||
| 653 | |a Automation | ||
| 653 | |a Information dissemination | ||
| 653 | |a Vocabulary | ||
| 653 | |a Networks | ||
| 653 | |a Intelligence | ||
| 653 | |a Reasoning | ||
| 653 | |a Planning | ||
| 653 | |a Social networks | ||
| 700 | 1 | |a Theron, Jacques | |
| 700 | 1 | |a van Heerden, Renier | |
| 700 | 1 | |a Leenen, Louise | |
| 773 | 0 | |t International Conference on Cyber Warfare and Security |g (2015), p. 69-79 | |
| 786 | 0 | |d ProQuest |t Political Science Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/1781335902/abstract/embedded/ZKJTFFSVAI7CB62C?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/1781335902/fulltext/embedded/ZKJTFFSVAI7CB62C?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/1781335902/fulltextPDF/embedded/ZKJTFFSVAI7CB62C?source=fedsrch |