Abstract
In this article we outline an ontology of secure operations in cyberspace, describing its primary characteristics through some basic modeling examples. We make the case for adopting a rigorous semantic model of cyber security to overcome the current limits of the state of the art, namely lack of comprehensive knowledge representation and effective automatic reasoning functionalities.
Original language | English (US) |
---|---|
Title of host publication | 2015 IEEE Military Communications Conference, MILCOM 2015 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 318-323 |
Number of pages | 6 |
Volume | 2015-December |
ISBN (Electronic) | 9781509000739 |
DOIs | |
State | Published - Dec 14 2015 |
Event | 34th Annual IEEE Military Communications Conference, MILCOM 2015 - Tampa, United States Duration: Oct 26 2015 → Oct 28 2015 |
Other
Other | 34th Annual IEEE Military Communications Conference, MILCOM 2015 |
---|---|
Country/Territory | United States |
City | Tampa |
Period | 10/26/15 → 10/28/15 |
All Science Journal Classification (ASJC) codes
- Electrical and Electronic Engineering