Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterrorism activities overlap with traditional hacking and Information and Communication Technology (ICT) Infrastructure exploitation. As a result, the defining and differentiating characteristics of cyberterrorism can easily be misunderstood. The use of an ontology specifically developed for cyberterrorism, will provide a common framework to share conceptual models. By using an ontology, the internal and external environment of a field (in this case, cyberterrorism) can be captured together with the relationships between the environments. This paper proposes an ontology to identify whether a cyber event can be classified as a cyberterrorist attack...
Abstract: Terrorism has entered a new wave in that the latest battleground to emerge is cyberspace. ...
We first consider network security services and then review threats, vulnerabilities and failure mo...
Cyber-attacks are increasing at an alarming rate and the attackers have progressively improved in de...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...
This paper presents a methodology using network attack ontology to classify computer-based attacks. ...
Prevention of exploits requires timely intelligence about the cybersecurity vulnerabilities and thre...
Cyber attack nowadays is increasingly being reported. Defenders need a good understanding of attacke...
One of the most popular attack vectors against computers are their network connections. Attacks on c...
The prediction of attacks is essential for the prevention of potential risk. Therefore, risk forecas...
Cyber operations lack models, methodologies, and mechanisms to describe relevant data and knowledge....
Threat intelligence is the provision of evidence-based knowledge about existing or potential threats...
Abstract—Situation awareness depends on a reliable perception of the environment and comprehension o...
Considering the continuous growth in the complexity of both information systems and security informa...
Abstract. We state the benefits of transitioning from taxonomies to ontologies and ontology specific...
Abstract: Terrorism has entered a new wave in that the latest battleground to emerge is cyberspace. ...
We first consider network security services and then review threats, vulnerabilities and failure mo...
Cyber-attacks are increasing at an alarming rate and the attackers have progressively improved in de...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...
This paper presents a methodology using network attack ontology to classify computer-based attacks. ...
Prevention of exploits requires timely intelligence about the cybersecurity vulnerabilities and thre...
Cyber attack nowadays is increasingly being reported. Defenders need a good understanding of attacke...
One of the most popular attack vectors against computers are their network connections. Attacks on c...
The prediction of attacks is essential for the prevention of potential risk. Therefore, risk forecas...
Cyber operations lack models, methodologies, and mechanisms to describe relevant data and knowledge....
Threat intelligence is the provision of evidence-based knowledge about existing or potential threats...
Abstract—Situation awareness depends on a reliable perception of the environment and comprehension o...
Considering the continuous growth in the complexity of both information systems and security informa...
Abstract. We state the benefits of transitioning from taxonomies to ontologies and ontology specific...
Abstract: Terrorism has entered a new wave in that the latest battleground to emerge is cyberspace. ...
We first consider network security services and then review threats, vulnerabilities and failure mo...
Cyber-attacks are increasing at an alarming rate and the attackers have progressively improved in de...