A requires/provides model for computer attacks
Proceedings of the 2000 workshop on New security paradigms
Natural language processing for information assurance and security: an overview and implementations
Proceedings of the 2000 workshop on New security paradigms
Anonymity, unobservability, and pseudeonymity — a proposal for terminology
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Computer Security Handbook
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Using DAML+OIL to classify intrusive behaviours
The Knowledge Engineering Review
COLING-Roadmap '02 Proceedings of the 2002 COLING workshop: A roadmap for computational linguistics - Volume 13
The genesis of a script for Bankruptcy in ontological semantics
HLT-NAACL-TEXTMEANING '03 Proceedings of the HLT-NAACL 2003 workshop on Text meaning - Volume 9
A user-oriented ontology-based approach for network intrusion detection
Computer Standards & Interfaces
Ontological Vulnerability Assessment
WISE '08 Proceedings of the 2008 international workshops on Web Information Systems Engineering
Formalizing information security knowledge
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
A logic-based model to support alert correlation in intrusion detection
Information Fusion
CoreSec: an ontology of security aplied to the business process of management
Proceedings of the 2008 Euro American Conference on Telematics and Information Systems
Semantic forensics: an application of ontological semantics to information assurance
TextMean '04 Proceedings of the 2nd Workshop on Text Meaning and Interpretation
Description logics for an autonomic IDS event analysis system
Computer Communications
An ontology-based intrusion alerts correlation system
Expert Systems with Applications: An International Journal
Ontological semantic technology for detecting insider threat and social engineering
Proceedings of the 2010 workshop on New security paradigms
Basis for an integrated security ontology according to a systematic review of existing proposals
Computer Standards & Interfaces
A framework for exploiting security expertise in application development
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
An ontology-based approach to information systems security management
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Semantic security against web application attacks
Information Sciences: an International Journal
Hi-index | 0.00 |
The paper introduces and advocates an ontological semantic approach to information security. Both the approach and its resources, the ontology and lexicons, are borrowed from the field of natural language processing and adjusted to the needs of the new domain. The approach pursues the ultimate dual goals of inclusion of natural language data sources as an integral part of the overall data sources in information security applications, and formal specification of the information security community know-how for the support of routine and time-efficient measures to prevent and counteract computer attacks. As the first order of the day, the approach is seen by the information security community as a powerful means to organize and unify the terminology and nomenclature of the field.