The Web is typically our first source of information about new software vulnerabilities, exploits and cyber-attacks. Information is found in semi-structured vulnerability databases as well as in text from security bulletins, news reports, cybersecurity blogs and Internet chat rooms. It can be useful to cybersecurity systems if there is a way to recognize and extract relevant information and represent it as easily shared and integrated semantic data. We describe such an automatic framework that generates and publishes a RDF linked data representation of cybersecurity concepts and vulnerability descriptions extracted from the National Vulnerability Database and other text sources. Entities, relations and concepts are represented using custom ...
Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers expl...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...
Cyber resilience is characterised by an ability to understand and adapt to changing network conditio...
The Web is typically our first source of information about new software vulnerabilities, exploits an...
Abstract—The Web is typically our first source of information about new software vulnerabilities, ex...
Prevention of exploits requires timely intelligence about the cybersecurity vulnerabilities and thre...
Cybersecurity solutions are highly based on data analysis. Currently, it is not enough to make an au...
Considering the continuous growth in the complexity of both information systems and security informa...
We first consider network security services and then review threats, vulnerabilities and failure mo...
The integration of networks within an organization made many critical infrastructures (CI) and their...
AbstractAs the computer network has evolved to provide the user many services, the attacks on these ...
One of the major cyber security challenges we face today is overcoming the current limits of securit...
Our goal was to collect data from the myriad computer vulnerability notices that exist on the World ...
In the paper the usage of the ontological approach, description logics and logical inference to the ...
Abstract. We state the benefits of transitioning from taxonomies to ontologies and ontology specific...
Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers expl...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...
Cyber resilience is characterised by an ability to understand and adapt to changing network conditio...
The Web is typically our first source of information about new software vulnerabilities, exploits an...
Abstract—The Web is typically our first source of information about new software vulnerabilities, ex...
Prevention of exploits requires timely intelligence about the cybersecurity vulnerabilities and thre...
Cybersecurity solutions are highly based on data analysis. Currently, it is not enough to make an au...
Considering the continuous growth in the complexity of both information systems and security informa...
We first consider network security services and then review threats, vulnerabilities and failure mo...
The integration of networks within an organization made many critical infrastructures (CI) and their...
AbstractAs the computer network has evolved to provide the user many services, the attacks on these ...
One of the major cyber security challenges we face today is overcoming the current limits of securit...
Our goal was to collect data from the myriad computer vulnerability notices that exist on the World ...
In the paper the usage of the ontological approach, description logics and logical inference to the ...
Abstract. We state the benefits of transitioning from taxonomies to ontologies and ontology specific...
Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers expl...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...
Cyber resilience is characterised by an ability to understand and adapt to changing network conditio...