Artificial Intelligence

Journal Information
ISSN / EISSN : 03029743 / 16113349
Current Publisher: Springer Science and Business Media LLC (10.1007)

Latest articles in this journal

Xuezhi Wang, Cong Yu
Lecture Notes in Computer Science pp 698-715; doi:10.1007/978-3-030-30793-6_40

The publisher has not yet granted permission to display this abstract.
Arnaud Giacometti, Béatrice Markhoff, Arnaud Soulet
Lecture Notes in Computer Science pp 182-199; doi:10.1007/978-3-030-30793-6_11

The publisher has not yet granted permission to display this abstract.
Changjian Wang, Minghui Yan, Chuanrun Yi, Ying Sha
Lecture Notes in Computer Science pp 664-679; doi:10.1007/978-3-030-30793-6_38

The publisher has not yet granted permission to display this abstract.
Ivan Donadello, Mauro Dragoni
Lecture Notes in Computer Science pp 363-381; doi:10.1007/978-3-030-30796-7_23

The publisher has not yet granted permission to display this abstract.
Labinot Bajraktari, Magdalena Ortiz, Guohui Xiao
Lecture Notes in Computer Science pp 75-92; doi:10.1007/978-3-030-30793-6_5

The publisher has not yet granted permission to display this abstract.
Juan F. Sequeda, Willard J. Briggs, Daniel P. Miranker, Wayne P. Heideman
Lecture Notes in Computer Science pp 526-545; doi:10.1007/978-3-030-30796-7_32

The publisher has not yet granted permission to display this abstract.
Vanessa Lopez, Valentina Rho, Theodora S. Brisimi, Fabrizio Cucci, Morten Kristiansen, John Segrave-Daly, Jillian Scalvini, John Davis, Grace Ferguson
Lecture Notes in Computer Science pp 471-489; doi:10.1007/978-3-030-30796-7_29

The publisher has not yet granted permission to display this abstract.
Elmar Kiesling, Andreas Ekelhart, Kabul Kurniawan, Fajar Ekaputra
Lecture Notes in Computer Science pp 198-214; doi:10.1007/978-3-030-30796-7_13

Abstract:This paper introduces an evolving cybersecurity knowledge graph that integrates and links critical information on real-world vulnerabilities, weaknesses and attack patterns from various publicly available sources. Cybersecurity constitutes a particularly interesting domain for the development of a domain-specific public knowledge graph, particularly due to its highly dynamic landscape characterized by time-critical, dispersed, and heterogeneous information. To build and continually maintain a knowledge graph, we provide and describe an integrated set of resources, including vocabularies derived from well-established standards in the cybersecurity domain, an ETL workflow that updates the knowledge graph as new information becomes available, and a set of services that provide integrated access through multiple interfaces. The resulting semantic resource offers comprehensive and integrated up-to-date instance information to security researchers and professionals alike. Furthermore, it can be easily linked to locally available information, as we demonstrate by means of two use cases in the context of vulnerability assessment and intrusion detection.
José-Miguel Herrera, Aidan Hogan, Tobias Käfer
Lecture Notes in Computer Science pp 163-180; doi:10.1007/978-3-030-30796-7_11

The publisher has not yet granted permission to display this abstract.
Pasquale Lisena, Albert Meroño-Peñuela, Tobias Kuhn, Raphaël Troncy
Lecture Notes in Computer Science pp 454-470; doi:10.1007/978-3-030-30796-7_28

The publisher has not yet granted permission to display this abstract.