iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.3233/JIFS-211696
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T05:29:33Z","timestamp":1732685373119,"version":"3.28.2"},"reference-count":11,"publisher":"SAGE Publications","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2022,11,11]]},"abstract":"Because multiple domain cyberspace joint attacks are becoming more widespread, establishing a multiple domain cyberspace defensive paradigm is becoming more vital. However, although some physical domain and social domain information is incorporated in present approaches, total modeling of cyberspace is absent, therefore thorough modeling of cyberspace is becoming increasingly necessary. This paper proposed a knowledge graph based multiple domain cyberspace modeling approach. A knowledge graph of multiple domain cyberspace is produced by extracting multiple domain entity information and entity relations such as physical domain, social domain, network domain, and information domain, so that semantic information of multiple domain cyberspace may be described consistently. At the same time, this paper proposed a user\u2019s permissions reasoning method based on multiple domain cyberspace knowledge graph to address the user\u2019s permissions reasoning that relies on artificial reasoning principles. Through the model learning knowledge graph triples characteristics and rules, and implementing automatic reasoning of user\u2019s permissions, this proposed method can abandon the artificial model of writing reasoning rules, allowing the machine to learn the reasoning rules using machine learning and other methods. Experimental results showed that the proposed method can learn relevant reasoning rules and accomplish automated reasoning of user\u2019s permissions, and that the method\u2019s accuracy and recall rates are higher than those of path ranking and translating embeddings.<\/jats:p>","DOI":"10.3233\/jifs-211696","type":"journal-article","created":{"date-parts":[[2022,9,2]],"date-time":"2022-09-02T15:22:59Z","timestamp":1662132179000},"page":"8195-8206","source":"Crossref","is-referenced-by-count":1,"title":["A unified semantic description and user\u2019s permissions knowledge reasoning for multiple domain cyberspace based on knowledge graph"],"prefix":"10.1177","volume":"43","author":[{"given":"Lei","family":"Zhang","sequence":"first","affiliation":[{"name":"Command and Control Engineering College, Army Engineering University of PLA, Nanjing, China"}]},{"given":"Wei","family":"Bai","sequence":"additional","affiliation":[{"name":"Command and Control Engineering College, Army Engineering University of PLA, Nanjing, China"}]},{"given":"Shize","family":"Guo","sequence":"additional","affiliation":[{"name":"Command and Control Engineering College, Army Engineering University of PLA, Nanjing, China"}]},{"given":"Youwei","family":"Xu","sequence":"additional","affiliation":[{"name":"Command and Control Engineering College, Army Engineering University of PLA, Nanjing, China"}]},{"given":"Kaolin","family":"Jiang","sequence":"additional","affiliation":[{"name":"Command and Control Engineering College, Army Engineering University of PLA, Nanjing, China"}]},{"given":"Yu","family":"Pan","sequence":"additional","affiliation":[{"name":"Command and Control Engineering College, Army Engineering University of PLA, Nanjing, China"}]},{"given":"Qibin","family":"Zheng","sequence":"additional","affiliation":[{"name":"Advanced Institute of Big Data, Beijing, China"}]},{"given":"Jun","family":"Chen","sequence":"additional","affiliation":[{"name":"Command and Control Engineering College, Army Engineering University of PLA, Nanjing, China"}]},{"given":"Zhisong","family":"Pan","sequence":"additional","affiliation":[{"name":"Command and Control Engineering College, Army Engineering University of PLA, Nanjing, China"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-211696_ref2","first-page":"56","article-title":"Overview of knowledge map for cyber space security intelligence","volume":"5","author":"Dong","year":"2020","journal-title":"Journal of Cyber Security"},{"issue":"4","key":"10.3233\/JIFS-211696_ref4","doi-asserted-by":"crossref","first-page":"282","DOI":"10.12677\/HJDM.2020.104030","article-title":"Knowledge Graph Oriented Information Extraction","volume":"10","author":"Zhao","year":"2020","journal-title":"Hans Journal of Data Mining"},{"key":"10.3233\/JIFS-211696_ref5","first-page":"2139","article-title":"Research on knowledge graph data management: A survey,","volume":"30","author":"Wang","year":"2019","journal-title":"Journal of Software"},{"key":"#cr-split#-10.3233\/JIFS-211696_ref6.1","doi-asserted-by":"crossref","unstructured":"Undercoffer J. , Joshi A. , Pinkston J. Modeling computer attacks: An ontology for intrusion detection, In: Proceedings of the Recent advances in intrusion detection, 2003 Sep 8-10","DOI":"10.1007\/978-3-540-45248-5_7"},{"key":"#cr-split#-10.3233\/JIFS-211696_ref6.2","unstructured":"Pittsburgh, PA, USA. Berlin: Springer, 2003, pp. 113-135"},{"key":"10.3233\/JIFS-211696_ref9","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.eng.2018.01.004","article-title":"A Practical approach to constructing a knowledge graph for cybersecurity[J],","volume":"4","author":"Jia","year":"2018","journal-title":"Engineering"},{"issue":"10","key":"10.3233\/JIFS-211696_ref10","first-page":"2931","article-title":"Accurate and efficient method for constructing domain knowledge graph","volume":"29","author":"Yang","year":"2018","journal-title":"Journal of Software"},{"issue":"3","key":"10.3233\/JIFS-211696_ref14","first-page":"138","article-title":"Research on massive knowledge storage for network monitoring and early warning","volume":"44","author":"Rao","year":"2018","journal-title":"Computer Engineering"},{"issue":"4","key":"10.3233\/JIFS-211696_ref15","first-page":"583","article-title":"Domain ontology and knowledge inference based semantic web application","volume":"38","author":"Gu","year":"2004","journal-title":"Journal of Shanghai Jiaotong University"},{"key":"10.3233\/JIFS-211696_ref16","doi-asserted-by":"crossref","unstructured":"Paulheim H. , Bizer C. Type inference on noisy RDF data, in: Proceedings of the 12th International Semantic Web Conference, Berlin: Springer, 2013, pp. 510\u2013525.","DOI":"10.1007\/978-3-642-41335-3_32"},{"key":"10.3233\/JIFS-211696_ref18","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.websem.2014.11.001","article-title":"Linked hypernyms: Enriching DBpedia with targeted hypernym discovery,","volume":"31","author":"Kliegr","year":"2015","journal-title":"Web Semant"}],"container-title":["Journal of Intelligent & Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-211696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T13:59:21Z","timestamp":1732629561000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospress&doi=10.3233\/JIFS-211696"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,11]]},"references-count":11,"journal-issue":{"issue":"6"},"URL":"http:\/\/dx.doi.org\/10.3233\/jifs-211696","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"type":"print","value":"1064-1246"},{"type":"electronic","value":"1875-8967"}],"subject":[],"published":{"date-parts":[[2022,11,11]]}}}