On the Use of Ontology Data for Protecting Critical Infrastructures

Guardado en:
Detalles Bibliográficos
Publicado en:Journal of Information Warfare vol. 17, no. 4 (2018), p. 38
Autor principal: Henriques, J
Otros Autores: Caldeira, F, Cruz, T, Simões, P
Publicado:
Peregrine Technical Solutions
Materias:
Acceso en línea:Citation/Abstract
Full Text
Full Text - PDF
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!

MARC

LEADER 00000nab a2200000uu 4500
001 2307957104
003 UK-CbPIL
022 |a 1445-3312 
022 |a 1445-3347 
035 |a 2307957104 
045 2 |b d20180101  |b d20181231 
100 1 |a Henriques, J  |u Department of Informatics Engineering University of Coimbra Coimbra, Portugal 
245 1 |a On the Use of Ontology Data for Protecting Critical Infrastructures 
260 |b Peregrine Technical Solutions  |c 2018 
513 |a Journal Article 
520 3 |a Modern societies increasingly depend on products and services provided by Critical Infrastructures (CI). The Security Information and Event Management (SIEM) systems in charge of protecting these CIs usually collect and process data from specialised sources. However, they usually integrate only a smallfraction of the whole data sources existing in the CI. Valuable generic data sources are missing in this process, such as human resources databases, staff check clocks, and outsourced service providers. To address this gap, the authors propose a framework that takes a Semantic Web approach for automated collection and processing of corporate data from multiple heterogeneous sources. 
653 |a International conferences 
653 |a Datasets 
653 |a Linked Data 
653 |a Computer science 
653 |a Trends 
653 |a Ontology 
653 |a Optimization techniques 
653 |a Clocks 
653 |a Intelligent systems 
653 |a Data sources 
653 |a Relational data bases 
653 |a Events planning 
653 |a Semantic web 
653 |a Resource Description Framework-RDF 
653 |a Information management 
653 |a Human resources 
653 |a Access control 
653 |a Semantics 
653 |a Databases 
653 |a Event management 
653 |a Auditing 
653 |a Automation 
653 |a Compliance auditing 
653 |a Information systems 
653 |a Critical infrastructure 
653 |a Data processing 
653 |a Modern society 
653 |a Data 
653 |a Outsourcing 
700 1 |a Caldeira, F 
700 1 |a Cruz, T 
700 1 |a Simões, P 
773 0 |t Journal of Information Warfare  |g vol. 17, no. 4 (2018), p. 38 
786 0 |d ProQuest  |t Military Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/2307957104/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/2307957104/fulltext/embedded/6A8EOT78XXH2IG52?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/2307957104/fulltextPDF/embedded/6A8EOT78XXH2IG52?source=fedsrch