Ajou University repository

Applicability Analysis of Knowledge Graph Embedding on Blended Threat
  • Lee, Minkyung ;
  • Jung, In Su ;
  • Kim, Deuk Hun ;
  • Jang-Jaccard, Julian ;
  • Kwak, Jin
Citations

SCOPUS

0

Citation Export

DC Field Value Language
dc.contributor.authorLee, Minkyung-
dc.contributor.authorJung, In Su-
dc.contributor.authorKim, Deuk Hun-
dc.contributor.authorJang-Jaccard, Julian-
dc.contributor.authorKwak, Jin-
dc.date.issued2022-01-01-
dc.identifier.urihttps://aurora.ajou.ac.kr/handle/2018.oak/36830-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85142236761&origin=inward-
dc.description.abstractWith the advent of massive IoT in which objects and humans form highly dense interconnections, the development of new technologies and platforms has been significantly accelerated. In addition, networks and sensing technologies are being blended in various contexts, such as smart factories, digital health, and smart grids, etc. This hyper-connectivity of the blended environment has caused the diversification of the IoT environment and architecture and led to attack surface. Accordingly, the complexity of analyzing and responding to the security breaches is increasing. Hence, recent research has been focused on responding to the potential attack routes using a knowledge graph, a concept that is used to analyze the correlations between the threat data and potentially attackable asset data. However, as the analysis utilizes a single dataset, it has limitation in analyzing and predicting complex threat information. Therefore, to predict and respond to the potential complex security risks on IoBE, a knowledge graph embedding model applicable to blended threats is analyzed in this study.-
dc.description.sponsorshipThis work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. 2021R1A2C2011391).-
dc.language.isoeng-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.subject.meshApplicability analysis-
dc.subject.meshBlended threats-
dc.subject.meshGraph embeddings-
dc.subject.meshHighly dense-
dc.subject.meshIobe-
dc.subject.meshKnowledge embedding-
dc.subject.meshKnowledge graphs-
dc.subject.meshNetwork technologies-
dc.subject.meshSensing technology-
dc.subject.meshSmart grid-
dc.titleApplicability Analysis of Knowledge Graph Embedding on Blended Threat-
dc.typeConference-
dc.citation.conferenceDate2022.8.22. ~ 2022.8.24.-
dc.citation.conferenceName7th International Conference on Platform Technology and Service, PlatCon 2022-
dc.citation.edition2022 International Conference on Platform Technology and Service, PlatCon 2022 - Proceedings-
dc.citation.endPage52-
dc.citation.startPage48-
dc.citation.title2022 International Conference on Platform Technology and Service, PlatCon 2022 - Proceedings-
dc.identifier.bibliographicCitation2022 International Conference on Platform Technology and Service, PlatCon 2022 - Proceedings, pp.48-52-
dc.identifier.doi10.1109/platcon55845.2022.9932052-
dc.identifier.scopusid2-s2.0-85142236761-
dc.identifier.urlhttp://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9932030-
dc.subject.keywordblended threat-
dc.subject.keywordiobe-
dc.subject.keywordknowledge embedding-
dc.type.otherConference Paper-
dc.description.isoafalse-
dc.subject.subareaArtificial Intelligence-
dc.subject.subareaComputer Science Applications-
dc.subject.subareaHardware and Architecture-
dc.subject.subareaInformation Systems-
dc.subject.subareaInformation Systems and Management-
dc.subject.subareaControl and Optimization-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

KWAK, JIN Image
KWAK, JIN곽진
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.