TY - GEN
T1 - Computational ontology of network operations
AU - Oltramari, Alessandro
AU - Cranor, Lorrie Faith
AU - Walls, Robert J.
AU - McDaniel, Patrick
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/12/14
Y1 - 2015/12/14
N2 - In this article we outline an ontology of secure operations in cyberspace, describing its primary characteristics through some basic modeling examples. We make the case for adopting a rigorous semantic model of cyber security to overcome the current limits of the state of the art, namely lack of comprehensive knowledge representation and effective automatic reasoning functionalities.
AB - In this article we outline an ontology of secure operations in cyberspace, describing its primary characteristics through some basic modeling examples. We make the case for adopting a rigorous semantic model of cyber security to overcome the current limits of the state of the art, namely lack of comprehensive knowledge representation and effective automatic reasoning functionalities.
UR - http://www.scopus.com/inward/record.url?scp=84959308687&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84959308687&partnerID=8YFLogxK
U2 - 10.1109/MILCOM.2015.7357462
DO - 10.1109/MILCOM.2015.7357462
M3 - Conference contribution
AN - SCOPUS:84959308687
T3 - Proceedings - IEEE Military Communications Conference MILCOM
SP - 318
EP - 323
BT - 2015 IEEE Military Communications Conference, MILCOM 2015
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 34th Annual IEEE Military Communications Conference, MILCOM 2015
Y2 - 26 October 2015 through 28 October 2015
ER -