2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN) 2016
DOI: 10.1109/msn.2016.030
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Inference on Knowledge Graphs: Hardness and Approximation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…For example, a core node for linking, and mediating between, cybersecurity Linked Open Data (LOD) KOSes in the LOD Cloud 36 is the Unified Cybersecurity Ontology (UCO). It defines typed connections between STIX, CAPEC, 37 MAEC, 38 CWE, 39 CVE, 40 CVSS, 41 Cybox, 42 CPE, 43 OpenIOC, 44 STUCCO, Mobile Access Control, and the Cloud User Ontology terms [61]. VulOntology 45 is a vulnerability ontology that defines the relationship between vulnerabilities and applications, platforms, and weaknesses [44].…”
Section: Knowledge Graph-based Koses For Cybersecurity Applicationsmentioning
confidence: 99%
See 2 more Smart Citations
“…For example, a core node for linking, and mediating between, cybersecurity Linked Open Data (LOD) KOSes in the LOD Cloud 36 is the Unified Cybersecurity Ontology (UCO). It defines typed connections between STIX, CAPEC, 37 MAEC, 38 CWE, 39 CVE, 40 CVSS, 41 Cybox, 42 CPE, 43 OpenIOC, 44 STUCCO, Mobile Access Control, and the Cloud User Ontology terms [61]. VulOntology 45 is a vulnerability ontology that defines the relationship between vulnerabilities and applications, platforms, and weaknesses [44].…”
Section: Knowledge Graph-based Koses For Cybersecurity Applicationsmentioning
confidence: 99%
“…This can be particularly useful if information about a threat actor is extracted from multiple sources and then subsequently fused and represented as a single knowledge graph. 36 https://lod-cloud.net 37 Common Attack Pattern Enumeration and Classification, https://capec.mitre.org 38 Malware Attribute Enumeration and Characterization, https://maecproject.github.io 39 Common Weakness Enumeration, https://cwe.mitre.org 40 Common Vulnerabilities and Exposures, https://cve.mitre.org 41 Common Vulnerability Scoring System, https://www.first.org/cvss/ 42 Cyber Observable eXpression, https://cyboxproject.github.io 43 Common Platform Enumeration, https://nvd.nist.gov/products/cpe 44 Open Indicators of Compromise, https://github.com/mandiant/OpenIOC_1.1 45…”
Section: Knowledge Graph-based Koses For Cybersecurity Applicationsmentioning
confidence: 99%
See 1 more Smart Citation