Computational ontology of network operations

Alessandro Oltramari, Lorrie Faith Cranor, Robert J. Walls, Patrick Drew McDaniel

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

In this article we outline an ontology of secure operations in cyberspace, describing its primary characteristics through some basic modeling examples. We make the case for adopting a rigorous semantic model of cyber security to overcome the current limits of the state of the art, namely lack of comprehensive knowledge representation and effective automatic reasoning functionalities.

Original languageEnglish (US)
Title of host publication2015 IEEE Military Communications Conference, MILCOM 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages318-323
Number of pages6
Volume2015-December
ISBN (Electronic)9781509000739
DOIs
StatePublished - Dec 14 2015
Event34th Annual IEEE Military Communications Conference, MILCOM 2015 - Tampa, United States
Duration: Oct 26 2015Oct 28 2015

Other

Other34th Annual IEEE Military Communications Conference, MILCOM 2015
CountryUnited States
CityTampa
Period10/26/1510/28/15

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Computational ontology of network operations'. Together they form a unique fingerprint.

  • Cite this

    Oltramari, A., Cranor, L. F., Walls, R. J., & McDaniel, P. D. (2015). Computational ontology of network operations. In 2015 IEEE Military Communications Conference, MILCOM 2015 (Vol. 2015-December, pp. 318-323). [7357462] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/MILCOM.2015.7357462