Nothing Special   »   [go: up one dir, main page]

Yang et al., 2023 - Google Patents

CAKG: A Framework for Cybersecurity Threat Detection of Automotive via Knowledge Graph

Yang et al., 2023

Document ID
2584560962291834646
Author
Yang P
Lijie W
Yun L
Xuedong S
Yaxin W
Biheng G
Publication year
Publication venue
2023 8th International Conference on Data Science in Cyberspace (DSC)

External Links

Snippet

With the increasing complexity and connectivity of vehicles, ensuring their security has become a critical concern. In this study, we propose CAKG: A Framework For Cybersecurity Threat Detection Of Automotive Via Knowledge Graph, achieved with a knowledge graph for …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
US20220353286A1 (en) Artificial intelligence cyber security analyst
US10958672B2 (en) Cognitive offense analysis using contextual data and knowledge graphs
US11194905B2 (en) Affectedness scoring engine for cyber threat intelligence services
US11012472B2 (en) Security rule generation based on cognitive and industry analysis
US20220201042A1 (en) Ai-driven defensive penetration test analysis and recommendation system
US10885393B1 (en) Scalable incident-response and forensics toolkit
US20210014258A1 (en) Cognitive information security using a behavioral recognition system
US10313365B2 (en) Cognitive offense analysis using enriched graphs
US7530105B2 (en) Tactical and strategic attack detection and prediction
US10536472B2 (en) Cognitive analysis of security data with signal flow-based graph exploration
US10686830B2 (en) Corroborating threat assertions by consolidating security and threat intelligence with kinetics data
KR20190086346A (en) Anticipatory cyber defense
US20220210202A1 (en) Advanced cybersecurity threat mitigation using software supply chain analysis
Wang et al. MAAC: Novel alert correlation method to detect multi-step attack
Zhang et al. An automatic assessment method of cyber threat intelligence combined with ATT&CK matrix
Gnatyuk et al. Studies on Cloud-based Cyber Incidents Detection and Identification in Critical Infrastructure.
Al-Sada et al. Mitre att&ck: State of the art and way forward
Angelini et al. An attack graph-based on-line multi-step attack detector
CN118138361A (en) Security policy making method and system based on autonomously evolutionary agent
Yang et al. CAKG: A Framework for Cybersecurity Threat Detection of Automotive via Knowledge Graph
Roschke et al. Using vulnerability information and attack graphs for intrusion detection
Polozhentsev et al. Novel Cyber Incident Management System for 5G-based Critical Infrastructures
Gnatyuk et al. Software System for Cybersecurity Events Correlation and Incident Management in Critical Infrastructure
Retnaswamy et al. A new ontology‐based multi agent framework for intrusion detection
Ivaki et al. AI-BASED INTRUSION DETECTION MECHANISMS FOR CLOUD-NATIVE SERVICES