2015
DOI: 10.1007/s10799-014-0213-1
|View full text |Cite
|
Sign up to set email alerts
|

Using ontologies to perform threat analysis and develop defensive strategies for mobile security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…In order to improve the ability of social crisis management, literature [15] proposes three paths for the government to dredge popular opinion on the Internet in emergency situations: improving the government's monitoring and guidance of popular opinion, improving the news release mechanism, and immediately investigatingm and punishing Internet rumors according to law. We can learn from keyword statis-tics that there are many online popular opinion articles on communication, journalism, pedagogy, sociology, and politics, according to literature [16].…”
Section: Related Workmentioning
confidence: 99%
“…In order to improve the ability of social crisis management, literature [15] proposes three paths for the government to dredge popular opinion on the Internet in emergency situations: improving the government's monitoring and guidance of popular opinion, improving the news release mechanism, and immediately investigatingm and punishing Internet rumors according to law. We can learn from keyword statis-tics that there are many online popular opinion articles on communication, journalism, pedagogy, sociology, and politics, according to literature [16].…”
Section: Related Workmentioning
confidence: 99%
“…A concept vector was created and features were selected using optimization algorithms. In [23] ontology was used to develop a model which can detect attack profile of a malware also result of a targeted attack to be successful in mobile security. An advanced semantic decision making system was proposed in [24] to identify malicious programs.…”
Section: B Ontology-based Frameworkmentioning
confidence: 99%
“…Onto-ACM (ontology-based access control model), is a semantic analysis model proposed by Chang Choi et al [3] to address the difference in the permitted access control between service providers and users. More over, in [18] ontologies are used to perform threat analysis and develop defensive strategies for mobile security. Autors has proposed on ontology-based approach that can identify an attack profile in accordance with structural signature of mobile viruses, and also overcome the uncertainty regarding the probability of an attack being successful, thanks to semantic reasoning.…”
Section: Related Workmentioning
confidence: 99%