2020
DOI: 10.1007/978-3-030-67681-0_4
|View full text |Cite
|
Sign up to set email alerts
|

Contextualized Knowledge Graphs in Communication Network and Cyber-Physical System Modeling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…Recent studies have demonstrated the application of knowledge graphs in identifying emerging trends, uncovering hidden connections, and predicting future research directions within scientific domains [4]- [11]. The integration of semantic analysis with graph-based structures allows for a more nuanced understanding of the thematic evolution in fields such as deep learning and cybersecurity [12], [13]. These advances highlight the potential of knowledge graphs to transform the exploration and exploitation of scientific literature, moving beyond traditional search mechanisms to enable a deeper, contextually rich engagement with content [14], [15].…”
Section: A Knowledge Graphsmentioning
confidence: 99%
“…Recent studies have demonstrated the application of knowledge graphs in identifying emerging trends, uncovering hidden connections, and predicting future research directions within scientific domains [4]- [11]. The integration of semantic analysis with graph-based structures allows for a more nuanced understanding of the thematic evolution in fields such as deep learning and cybersecurity [12], [13]. These advances highlight the potential of knowledge graphs to transform the exploration and exploitation of scientific literature, moving beyond traditional search mechanisms to enable a deeper, contextually rich engagement with content [14], [15].…”
Section: A Knowledge Graphsmentioning
confidence: 99%
“…Jia et al [21] proposed a framework to generate a cybersecurity knowledge base by utilizing an ontology based on vulnerabilities and by using the Stanford Named Entity Recognizer (NER) 50 and conditional random fields (CRFs) to extract cybersecurity entities from unstructured data. These are expressed in RDF, similar to the structured data (which is directly written in RDF).…”
Section: Knowledge Graph-based Koses For Cybersecurity Applicationsmentioning
confidence: 99%
“…-the nodes are cybersecurity concepts and properties, and the arcs are correlations between them [50]; -the nodes are network device types and their properties, the arcs are connections between them; -the nodes are vulnerabilities and the arcs define properties, such as vulnerability scoring, weaknesses, and platforms [26].…”
Section: Introduction To Cybersecurity Knowledge Graphsmentioning
confidence: 99%