메뉴 건너뛰기




Volumn , Issue , 2009, Pages 597-603

Security data mining in an ontology for vulnerability management

Author keywords

Information security; Measurement; Ontology; Semantic technology; Software vulnerabilities

Indexed keywords

INFORMATION SECURITY; INFORMATION-SECURITY MEASUREMENT; ONTOLOGY SEMANTICS; SECURITY DATA MINING; SECURITY PROFESSIONALS; SECURITY VULNERABILITIES; SEMANTIC TECHNOLOGIES; SOFTWARE VULNERABILITIES; VULNERABILITY ANALYSIS; VULNERABILITY MANAGEMENT;

EID: 70450167629     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IJCBS.2009.13     Document Type: Conference Paper
Times cited : (29)

References (55)
  • 1
    • 38849131285 scopus 로고    scopus 로고
    • Near-term prospects for semantic technologies
    • V, January/February
    • V, "Near-Term Prospects for Semantic Technologies," IEEE Intelligent Systems, January/February 2008, pp. 76-88.
    • (2008) IEEE Intelligent Systems , pp. 76-88
  • 2
    • 70349462879 scopus 로고    scopus 로고
    • Tipton H. F. and Henry K. (Eds), Auerbach Publication, ISBN: 0-8493-8231-9
    • 2 Guide to the CISSP CBK, Auerbach Publication, ISBN: 0-8493-8231-9, 2007.
    • (2007) 2 Guide to the CISSP CBK
  • 6
    • 70450121363 scopus 로고    scopus 로고
    • May 18-22, San Jose, California
    • 2008 Semantic Technology Conference, May 18-22, 2008, San Jose, California, http://www.semantic-conference.com/.
    • (2008) 2008 Semantic Technology Conference
  • 7
    • 70450144142 scopus 로고    scopus 로고
    • September 20
    • Semantic Discovery, http://www.semantichacker.com. September 20, 2008.
    • (2008) Semantic Discovery
  • 8
    • 70450166751 scopus 로고    scopus 로고
    • September 20
    • Semantic Journal, http://www.sandoval.ca:8080/SemanticWebJournal/ SemanticWebJournal.html. September 20, 2008.
    • (2008) Semantic Journal
  • 14
    • 70450121362 scopus 로고    scopus 로고
    • FAA outage reveals odd computing practices
    • Associated Press, August 29
    • Associated Press, FAA Outage Reveals Odd Computing Practices, MIT Technology Review, August 29, 2008.
    • (2008) MIT Technology Review
  • 15
    • 70450146950 scopus 로고    scopus 로고
    • NIST, Version 1.0 Beta, revised on May 22
    • NIST, Security Content Automation Protocol, Version 1.0 Beta, revised on May 22, 2007.
    • (2007) Security Content Automation Protocol
  • 17
    • 85052852832 scopus 로고    scopus 로고
    • Security log management
    • Syngress Publishing, Inc.
    • Babbin J. et al., Security Log Management, Identifying Patterns in the Chaos, Syngress Publishing, Inc. 2006.
    • (2006) Identifying Patterns in the Chaos
    • Babbin, J.1
  • 19
    • 63049084996 scopus 로고    scopus 로고
    • Metrics for information security vulnerabilities
    • J. A. Wang, M. Xia, and F. Zhang, "Metrics for Information Security Vulnerabilities, Journal of Applied Global Research, Volume 1, No. 1, 2008, pp. 48-58.
    • (2008) Journal of Applied Global Research , vol.1 , Issue.1 , pp. 48-58
    • Wang, J.A.1    Xia, M.2    Zhang, F.3
  • 20
    • 33947219926 scopus 로고    scopus 로고
    • Information security models and metrics
    • ISBN: 1-59593-059-0. March, Kennesaw, GA
    • rd ACM Southeast Conference, Volume 2, pp. 178-184. ISBN: 1-59593-059-0. March 2005, Kennesaw, GA.
    • (2005) rd ACM Southeast Conference , vol.2 , pp. 178-184
    • Wang, J.A.1
  • 21
    • 78650760840 scopus 로고    scopus 로고
    • Temporal metrics for software vulnerabilities
    • May 12-14, Oak Ridge, TN, USA
    • J.A.Wang, Fengwei Zhang and Min Xia, "Temporal Metrics for Software Vulnerabilities," in Proceedings of CSIIRW'08, May 12-14, 2008, Oak Ridge, TN, USA.
    • (2008) Proceedings of CSIIRW'08
    • Wang, J.A.1    Zhang, F.2    Xia, M.3
  • 22
    • 84869243600 scopus 로고    scopus 로고
    • Oracle Corporation, The Critical Patch Update, http://www.oracle.com/ technology/deploy/security/critical-patch-updates/cpuoct2006.html
    • The Critical Patch Update
  • 28
    • 58149365542 scopus 로고
    • Towards principles for the design of ontologies used for knowledge sharing
    • T. Gruber. Towards Principles for the Design of Ontologies used for Knowledge Sharing. International Journal of Human-Computer Studies, 1995. 43(5/6): 907-928.
    • (1995) International Journal of Human-computer Studies , vol.43 , Issue.5-6 , pp. 907-928
    • Gruber, T.1
  • 29
    • 17044383806 scopus 로고    scopus 로고
    • Security in the semantic web using OWL. Security in the semantic web using OWL
    • G. Denker, L. Kagal, and T. Finin. Security in the Semantic Web using OWL. Security in the Semantic Web using OWL. Information Security Technical Report, 2005. 10(1): p. 51-58.
    • (2005) Information Security Technical Report , vol.10 , Issue.1 , pp. 51-58
    • Denker, G.1    Kagal, L.2    Finin, T.3
  • 36
    • 0028514027 scopus 로고
    • A taxonomy of computer program security flaws
    • C. Landwehr, A. Bull, J. McDermott, and W.Choi. A Taxonomy of Computer Program Security Flaws. Computing Surveys, 1994, 26(3): pp. 211-254.
    • (1994) Computing Surveys , vol.26 , Issue.3 , pp. 211-254
    • Landwehr, C.1    Bull, A.2    McDermott, J.3    Choi, W.4
  • 44
    • 0242371001 scopus 로고    scopus 로고
    • Security for DAML web services: Annotation and matchmaking
    • Springer Berlin/Heidelberg
    • Denker, G., et al., Security for DAML Web Services: Annotation and Matchmaking, in The SemanticWeb-ISWC 2003. 2003, Springer Berlin/Heidelberg. p. 335-350.
    • (2003) The SemanticWeb-ISWC 2003 , pp. 335-350
    • Denker, G.1
  • 51
    • 70450156864 scopus 로고    scopus 로고
    • Web-Ontology (WebOnto) working Group, November
    • Web-Ontology (WebOnto) working Group. http://www.w3.org/2001/sw/WebOnt/, November, 2008.
    • (2008)
  • 52
    • 70450140702 scopus 로고    scopus 로고
    • November
    • Protégé. http://protege.stanford.edu/, November, 2008
    • (2008)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.