2020
DOI: 10.1016/j.im.2020.103334
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 66 publications
(28 citation statements)
references
References 41 publications
0
27
0
1
Order By: Relevance
“…Kiran et al [49] present enhanced security-aware technique and ontology data access control in cloud computing. Syed et al [97] present a conceptual ontology and cyber intelligence alert system for cybersecurity vulnerability management. An ontologybased cyber security policy implementation in Saudi Arabia has been presented in Talib et al [98].…”
Section: Knowledge Representation Uncertainty Reasoning and Expert System Modelingmentioning
confidence: 99%
“…Kiran et al [49] present enhanced security-aware technique and ontology data access control in cloud computing. Syed et al [97] present a conceptual ontology and cyber intelligence alert system for cybersecurity vulnerability management. An ontologybased cyber security policy implementation in Saudi Arabia has been presented in Talib et al [98].…”
Section: Knowledge Representation Uncertainty Reasoning and Expert System Modelingmentioning
confidence: 99%
“…This study has focused on developing and evaluating an ontology model for analyzing cyber influence campaigns in conflicts conducted in social media networks. Social media networks can also give indications of emerging cyber security threats [119]- [123]. One interesting future work direction is to adapt our ontology model to uncover the sources and agents behind emerging cyber threats.…”
Section: F Limitations and Future Researchmentioning
confidence: 99%
“…Because, as Huysmans argues, OST is founded upon relational security practices and the ability to perceive which are and are not manifest security threats is hotly in contention and is driven “by ‘securitizing’ the unknown into an identifiable threat” (Steele, 2017). The unknown in this case can be typified, though not flippantly, by the “half a billion cyber security breaches in first semester of 2014” (Oltramari et al, 2014) or the “16,555 vulnerabilities between January 1, 2018, and December 31, 2018” (Syed, 2020). This picture of the cyber horizon is made even more chaotic when one recognizes that “65% of the victims of intrusion and information theft in the private sector are notified by third parties and that the detection process usually takes up to 13 months” (quoted in Syed, 2020).…”
Section: Ontological Security Theory Cyber Conflict and Visionmentioning
confidence: 99%
“…The unknown in this case can be typified, though not flippantly, by the “half a billion cyber security breaches in first semester of 2014” (Oltramari et al, 2014) or the “16,555 vulnerabilities between January 1, 2018, and December 31, 2018” (Syed, 2020). This picture of the cyber horizon is made even more chaotic when one recognizes that “65% of the victims of intrusion and information theft in the private sector are notified by third parties and that the detection process usually takes up to 13 months” (quoted in Syed, 2020).…”
Section: Ontological Security Theory Cyber Conflict and Visionmentioning
confidence: 99%
See 1 more Smart Citation