The top 20 semantic cyber security

1 Semantic Knowledge Architecture for Cyber Security – ProQuest

2 Semantic ontologies for cyber threat sharing standards – IEEE Xplore

  • Author: ieeexplore.ieee.org
  • Published: 02/08/2022
  • Review: 4.74 (316 vote)
  • Summary: Automated cyber threat intelligence information exchange systems enable cyber attack response teams to share information about cyber-attacks

3 Why we should retire the latest buzzword in security studies

4 Company | Semantic AI

  • Author: semantic-ai.com
  • Published: 05/06/2022
  • Review: 4.22 (454 vote)
  • Summary: We help users see and analyze data, in context, through a unique, human-usable data model. Whether it is eliminating fraud, protecting you from cyber security 

5 Development of a semantic-enabled cybersecurity threat

  • Author: researchspace.csir.co.za
  • Published: 08/08/2021
  • Review: 4.05 (233 vote)
  • Summary: In addition, emerging cybersecurity intelligence solutions lack the semantic knowledge essential for automated sharing of timely and context-aware 

6 Cyber Security for Wireless Semantic (SCADA/DCS) Systems

  • Author: hal.archives-ouvertes.fr
  • Published: 02/13/2022
  • Review: 3.89 (222 vote)
  • Summary: In this work, we present a semantic cyber security vulnerabilities add to classic one, with the use of semantic embedded application in smart devices in 

7 Semantic Technology is Ready to Power Next-Generation Cyber

  • Author: dataversity.net
  • Published: 12/04/2021
  • Review: 3.68 (311 vote)
  • Summary: · Cyber security is always a hot topic, but every time another Big Data exposure makes headlines, it becomes even hotter

8 [PDF] A Semantic Model for Security Evaluation of Information Systems

  • Author: journals.riverpublishers.com
  • Published: 10/03/2021
  • Review: 3.39 (409 vote)
  • Summary: Keywords: Security evaluation, security assessment, semantics, metrics, ontology, cyber attacks, intelligent data analysis. Journal of Cyber Security and 

9 [PDF] A Semantic Model for Cyber Security

  • Author: semanticscholar.org
  • Published: 04/22/2022
  • Review: 3.31 (440 vote)
  • Summary: This work used Semantic Web Technology to create an ontology that is capable of reasoning about security attributes and developed a GUI that displayed the 

10 [PDF] Multi-features based Semantic Augmentation Networks for Named

  • Author: arxiv.org
  • Published: 11/08/2021
  • Review: 3.06 (283 vote)
  • Summary: · Index Terms—cybersecurity, named entity recognition, multi- features, semantic augmentation, attention mechanism. I. INTRODUCTION. The cyber 

11 Quantifying the Significance of Cybersecurity Text through Semantic

  • Author: insticc.org
  • Published: 01/21/2022
  • Review: 2.91 (191 vote)
  • Summary: ABSTRACT In order to proactively mitigate the risks of cybersecurity, security analysts have to continuously monitor threat information sources. · KEYWORDS Cyber 

12 (PDF) The Semantic Approach to Cyber Security. Towards Ontology

  • Author: researchgate.net
  • Published: 03/23/2022
  • Review: 2.81 (108 vote)
  • Summary: · Keywords: cyber security, semantic web technology, attacks, threats, ontology. 1. Introduction. The field of cyber security is based on a 

13 7.17. Foil Semantic Attacks

  • Author: dwheeler.com
  • Published: 04/12/2022
  • Review: 2.75 (101 vote)
  • Summary: A “semantic attack” is an attack in which the attacker uses the computing infrastructure/system in a way that fools the victim into thinking they are doing 

14 Beyond NVD: Cybersecurity meets the … – ACM Digital Library

  • Author: dl.acm.org
  • Published: 12/03/2021
  • Review: 2.51 (196 vote)
  • Summary: The transformative power of Semantic Web technologies for cybersecurity, which has been proven in the biomedical field, is evaluated and discussed

15 Towards a More Representative Definition of Cyber Security

  • Author: commons.erau.edu
  • Published: 01/11/2022
  • Review: 2.44 (175 vote)
  • Summary: main definitions provided for the term ‘Cyber Security’ by authoritative sources. We then conduct various lexical and semantic analysis techniques in an 

16 Symantec Enterprise Cloud – Broadcom Inc

  • Author: broadcom.com
  • Published: 01/20/2022
  • Review: 2.41 (170 vote)
  • Summary: Leading Cybersecurity Portfolios … Symantec Enterprise Cloud drives the most comprehensive set of security portfolios in the industry, across endpoint, network, 

17 A review of problems and solutions with semantic web technologies

  • Author: content.iospress.com
  • Published: 01/30/2022
  • Review: 2.28 (81 vote)
  • Summary: · However, considering the scope of this article, we focus here on cyber-security, which relates to security issues and challenges associated 

18 A Semantic Approach to Modelling of Cybersecurity Domain – jstor

  • Author: jstor.org
  • Published: 11/21/2021
  • Review: 2.24 (168 vote)
  • Summary: Keywords: Cybersecurity, Semantic Web Technology, Attacks, Threats, Ontology. Introduction. The field of cybersecurity entails a difficult-to-master body of 

19 SemEval-2018 Task 8: Semantic Extraction from CybersecUrity

  • Author: aclanthology.org
  • Published: 04/27/2022
  • Review: 2.14 (102 vote)
  • Summary: Abstract. This paper describes the SemEval 2018 shared task on semantic extraction from cybersecurity reports, which is introduced for the first time as a 

20 Cyber Security – SemanticBits

  • Author: semanticbits.com
  • Published: 09/24/2021
  • Review: 2.07 (124 vote)
  • Summary: Our team works to evaluate risks and designs end-to-end data protections that prevent leaks, breaches and other threats from ever becoming realities