Ajou University repository

A Tool for Security Requirements Recommendation using Case-Based Problem Domain Ontology
Citations

SCOPUS

0

Citation Export

DC Field Value Language
dc.contributor.authorJung, Ji Wook-
dc.contributor.authorPark, Sihn Hye-
dc.contributor.authorLee, Seok Won-
dc.date.issued2021-01-01-
dc.identifier.urihttps://aurora.ajou.ac.kr/handle/2018.oak/36715-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85123182577&origin=inward-
dc.description.abstractWith the significant increase of various cyber threats, the strategies of the attacks are becoming more diverse. In particular, more attention needs to be paid to Advanced Persistent Threat (APT) attacks since these attacks are continuously performed on a specific target for an apparent purpose through numerous tactics and techniques without being discovered for a long time. Although it is difficult to detect and respond to such APT attacks, it is more challenging to elicit security requirements that sufficiently reflect these complex characteristics for proactive defense. To address this problem, we propose a tool that recommends security requirements for APT attacks using the Case-Based Problem Domain Ontology specialized for APT attacks.-
dc.language.isoeng-
dc.publisherIEEE Computer Society-
dc.subject.meshAdvanced persistent threat-
dc.subject.meshCase based-
dc.subject.meshCasebased reasonings (CBR)-
dc.subject.meshComplex characteristics-
dc.subject.meshCyber threats-
dc.subject.meshDomain ontologies-
dc.subject.meshProactive defense-
dc.subject.meshProblem domain-
dc.subject.meshProblem domain ontology-
dc.subject.meshSecurity requirements-
dc.titleA Tool for Security Requirements Recommendation using Case-Based Problem Domain Ontology-
dc.typeConference-
dc.citation.conferenceDate2021.9.20. ~ 2021.9.24.-
dc.citation.conferenceName29th IEEE International Requirements Engineering Conference, RE 2021-
dc.citation.editionProceedings - 29th IEEE International Requirements Engineering Conference, RE 2021-
dc.citation.endPage439-
dc.citation.startPage438-
dc.citation.titleProceedings of the IEEE International Conference on Requirements Engineering-
dc.identifier.bibliographicCitationProceedings of the IEEE International Conference on Requirements Engineering, pp.438-439-
dc.identifier.doi10.1109/re51729.2021.00059-
dc.identifier.scopusid2-s2.0-85123182577-
dc.subject.keywordAdvanced Persistent Threat-
dc.subject.keywordCase-Based Reasoning-
dc.subject.keywordProblem Domain Ontology-
dc.subject.keywordSecurity Requirements-
dc.type.otherConference Paper-
dc.description.isoafalse-
dc.subject.subareaComputer Science (all)-
dc.subject.subareaEngineering (all)-
dc.subject.subareaStrategy and Management-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Lee, Seok-Won Image
Lee, Seok-Won이석원
Department of Software and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.