loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Gulnara Yakhyaeva and Olga Yasinkaya

Affiliation: Novosibirsk State University, Russian Federation

Keyword(s): Information Security, Cyber Threats, Case-based Model, Fuzzy Model, Generalized Fuzzy Model, Generalized Case.

Related Ontology Subjects/Areas/Topics: Advanced Applications of Fuzzy Logic ; Artificial Intelligence ; Artificial Intelligence and Decision Support Systems ; Biomedical Engineering ; Case-Based Reasoning ; Data Engineering ; Enterprise Information Systems ; Health Information Systems ; Information Systems Analysis and Specification ; Knowledge Management ; Ontologies and the Semantic Web ; Pattern Recognition ; Society, e-Business and e-Government ; Symbolic Systems ; Theory and Methods ; Web Information Systems and Technologies

Abstract: In this paper we describe a mathematical apparatus and software implementation of a module of the RiskPanel system, aimed to compare computer-security knowledge learned from various online sources. To describe this process, we use model-theoretic formalism. The knowledge of a particular computer attack obtained from the same source is formalized as an underdetermined algebraic system, which we call a generalized case. The knowledge base is a set of generalized cases. To implement the knowledge comparison, we construct a generalized fuzzy model, the product of all algebraic systems stored in the database. We consider an algorithm for computing consistent truth values and describe a software implementation of the developed methods. The developed algorithm has polynomial complexity.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.119.172.146

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Yakhyaeva, G. and Yasinkaya, O. (2015). An Algorithm to Compare Computer-security Knowledge from Different Sources. In Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 2: ICEIS; ISBN 978-989-758-096-3; ISSN 2184-4992, SciTePress, pages 565-572. DOI: 10.5220/0005347205650572

@conference{iceis15,
author={Gulnara Yakhyaeva. and Olga Yasinkaya.},
title={An Algorithm to Compare Computer-security Knowledge from Different Sources},
booktitle={Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 2: ICEIS},
year={2015},
pages={565-572},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005347205650572},
isbn={978-989-758-096-3},
issn={2184-4992},
}

TY - CONF

JO - Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 2: ICEIS
TI - An Algorithm to Compare Computer-security Knowledge from Different Sources
SN - 978-989-758-096-3
IS - 2184-4992
AU - Yakhyaeva, G.
AU - Yasinkaya, O.
PY - 2015
SP - 565
EP - 572
DO - 10.5220/0005347205650572
PB - SciTePress