Attribute exploration with background knowledge
Theoretical Computer Science
Foundations of statistical natural language processing
Foundations of statistical natural language processing
Knowledge representation: logical, philosophical and computational foundations
Knowledge representation: logical, philosophical and computational foundations
Networks and Netwars: The Future of Terror, Crime and Militancy
Networks and Netwars: The Future of Terror, Crime and Militancy
Conceptual Graphs and Formal Concept Analysis
ICCS '97 Proceedings of the Fifth International Conference on Conceptual Structures: Fulfilling Peirce's Dream
Beyond models of national culture in information systems research
Advanced topics in global information management
The Simple Economics of Cybercrimes
IEEE Security and Privacy
Rough concept lattice based ontology similarity measure
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
ECBS '07 Proceedings of the 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems
Cyber attack modeling and simulation for network security analysis
Proceedings of the 39th conference on Winter simulation: 40 years! The best is yet to come
A Behavioral Model of Ideologically-motivated "Snowball Attacks
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Correlating Multi-Step Attack and Constructing Attack Scenarios Based on Attack Pattern Modeling
ISA '08 Proceedings of the 2008 International Conference on Information Security and Assurance (isa 2008)
Learning concept hierarchies from text corpora using formal concept analysis
Journal of Artificial Intelligence Research
Automatic fine-grained semantic classification for domain adaptation
STEP '08 Proceedings of the 2008 Conference on Semantics in Text Processing
Building a Social Dimensional Threat Model from Current and Historic Events of Cyber Attacks
SOCIALCOM '10 Proceedings of the 2010 IEEE Second International Conference on Social Computing
Scene of the Cybercrime
Hi-index | 0.00 |
Cyberspace has increasingly become a medium to express outrage, conduct protests, take revenge, spread opinions, and stir up issues. Many cyber attacks can be linked to current and historic events in the social, political, economic, and cultural SPEC dimensions of human conflicts in the physical world. These SPEC factors are often the root cause of many cyber attacks. Understanding the relationships between past and current SPEC events and cyber attacks can help understand and better prepare people for impending cyber attacks. The focus of this paper is to analyse these attacks in social dimensions and build a threat model based on past and current social events. A reasoning technique based on a novel combination of formal concept analysis FCA and hierarchical fact-proposition space FPS inference is applied to build the model.