dc.contributor.author |
Van Heerden, Renier P
|
|
dc.contributor.author |
Chan, Ka Fai P
|
|
dc.contributor.author |
Leenen, L
|
|
dc.contributor.author |
Theron, J
|
|
dc.date.accessioned |
2017-02-03T08:35:43Z |
|
dc.date.available |
2017-02-03T08:35:43Z |
|
dc.date.issued |
2016-09 |
|
dc.identifier.citation |
Van Heerden, R., Chan, P., Leenen, L. and Theron, J. 2016. Using an ontology for network attack planning. International Journal of Cyber Warfare and Terrorism, 6(3), pp 65-78 |
en_US |
dc.identifier.issn |
1947-3443 |
|
dc.identifier.uri |
http://www.igi-global.com/article/using-an-ontology-for-network-attack-planning/159885
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/8929
|
|
dc.description |
Copyright: 2015 IGI Global. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website. The definitive version of the work is published in International Journal of Cyber Warfare and Terrorism, 6(3), pp 65-78 |
en_US |
dc.description.abstract |
The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within the cyber domain. The amount of cyber information is increasing constantly and the time that information stays relevant and valuable in decreasing similarly. Thus semantic technologies can contribute towards the intelligent processing of information in this ever-changing environment. An ontology enables the representation of semantic information. In additional, automated reasoning can enrich the representation by inferring unknown relationships. The inferences that can be made with the automated reasoning capabilities of ontologies provide a unique insight into the relationships between network targets and attacks, compared to traditional databases. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IGI Global |
en_US |
dc.relation.ispartofseries |
Wokflow;17522 |
|
dc.subject |
Command and control |
en_US |
dc.subject |
Cyber operations |
en_US |
dc.subject |
Cyber warfare |
en_US |
dc.subject |
Network attack planning |
en_US |
dc.subject |
Ontologies |
en_US |
dc.title |
Using an ontology for network attack planning |
en_US |
dc.type |
Article |
en_US |
dc.identifier.apacitation |
Van Heerden, R. P., Chan, K. F. P., Leenen, L., & Theron, J. (2016). Using an ontology for network attack planning. http://hdl.handle.net/10204/8929 |
en_ZA |
dc.identifier.chicagocitation |
Van Heerden, Renier P, Ka Fai P Chan, L Leenen, and J Theron "Using an ontology for network attack planning." (2016) http://hdl.handle.net/10204/8929 |
en_ZA |
dc.identifier.vancouvercitation |
Van Heerden RP, Chan KFP, Leenen L, Theron J. Using an ontology for network attack planning. 2016; http://hdl.handle.net/10204/8929. |
en_ZA |
dc.identifier.ris |
TY - Article
AU - Van Heerden, Renier P
AU - Chan, Ka Fai P
AU - Leenen, L
AU - Theron, J
AB - The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within the cyber domain. The amount of cyber information is increasing constantly and the time that information stays relevant and valuable in decreasing similarly. Thus semantic technologies can contribute towards the intelligent processing of information in this ever-changing environment. An ontology enables the representation of semantic information. In additional, automated reasoning can enrich the representation by inferring unknown relationships. The inferences that can be made with the automated reasoning capabilities of ontologies provide a unique insight into the relationships between network targets and attacks, compared to traditional databases.
DA - 2016-09
DB - ResearchSpace
DP - CSIR
KW - Command and control
KW - Cyber operations
KW - Cyber warfare
KW - Network attack planning
KW - Ontologies
LK - https://researchspace.csir.co.za
PY - 2016
SM - 1947-3443
T1 - Using an ontology for network attack planning
TI - Using an ontology for network attack planning
UR - http://hdl.handle.net/10204/8929
ER -
|
en_ZA |