Yang et al., 2023 - Google Patents
CAKG: A Framework for Cybersecurity Threat Detection of Automotive via Knowledge GraphYang et al., 2023
- Document ID
- 2584560962291834646
- Author
- Yang P
- Lijie W
- Yun L
- Xuedong S
- Yaxin W
- Biheng G
- Publication year
- Publication venue
- 2023 8th International Conference on Data Science in Cyberspace (DSC)
External Links
Snippet
With the increasing complexity and connectivity of vehicles, ensuring their security has become a critical concern. In this study, we propose CAKG: A Framework For Cybersecurity Threat Detection Of Automotive Via Knowledge Graph, achieved with a knowledge graph for …
- 238000001514 detection method 0 title abstract description 47
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220353286A1 (en) | Artificial intelligence cyber security analyst | |
US10958672B2 (en) | Cognitive offense analysis using contextual data and knowledge graphs | |
US11194905B2 (en) | Affectedness scoring engine for cyber threat intelligence services | |
US11012472B2 (en) | Security rule generation based on cognitive and industry analysis | |
US20220201042A1 (en) | Ai-driven defensive penetration test analysis and recommendation system | |
US10885393B1 (en) | Scalable incident-response and forensics toolkit | |
US20210014258A1 (en) | Cognitive information security using a behavioral recognition system | |
US10313365B2 (en) | Cognitive offense analysis using enriched graphs | |
US7530105B2 (en) | Tactical and strategic attack detection and prediction | |
US10536472B2 (en) | Cognitive analysis of security data with signal flow-based graph exploration | |
US10686830B2 (en) | Corroborating threat assertions by consolidating security and threat intelligence with kinetics data | |
KR20190086346A (en) | Anticipatory cyber defense | |
US20220210202A1 (en) | Advanced cybersecurity threat mitigation using software supply chain analysis | |
Wang et al. | MAAC: Novel alert correlation method to detect multi-step attack | |
Zhang et al. | An automatic assessment method of cyber threat intelligence combined with ATT&CK matrix | |
Gnatyuk et al. | Studies on Cloud-based Cyber Incidents Detection and Identification in Critical Infrastructure. | |
Al-Sada et al. | Mitre att&ck: State of the art and way forward | |
Angelini et al. | An attack graph-based on-line multi-step attack detector | |
CN118138361A (en) | Security policy making method and system based on autonomously evolutionary agent | |
Yang et al. | CAKG: A Framework for Cybersecurity Threat Detection of Automotive via Knowledge Graph | |
Roschke et al. | Using vulnerability information and attack graphs for intrusion detection | |
Polozhentsev et al. | Novel Cyber Incident Management System for 5G-based Critical Infrastructures | |
Gnatyuk et al. | Software System for Cybersecurity Events Correlation and Incident Management in Critical Infrastructure | |
Retnaswamy et al. | A new ontology‐based multi agent framework for intrusion detection | |
Ivaki et al. | AI-BASED INTRUSION DETECTION MECHANISMS FOR CLOUD-NATIVE SERVICES |