A Knowledge-Based Approach to Network Security: Applying Cyc in the Domain of Network Risk Assessment
dc.contributor.author | Shepard, Blake | |
dc.contributor.author | Matuszek, Cynthia | |
dc.contributor.author | Fraser, C. Bruce | |
dc.contributor.author | Wechtenhiser, William | |
dc.contributor.author | Crabbe, David | |
dc.contributor.author | Güngördü, Zelal | |
dc.contributor.author | Jantos, John | |
dc.contributor.author | Hughes, Todd | |
dc.contributor.author | Lefkowitz, Larry | |
dc.contributor.author | Witbrock, Michael | |
dc.contributor.author | Lenat, Doug | |
dc.contributor.author | Larson, Erik | |
dc.date.accessioned | 2018-09-06T17:39:44Z | |
dc.date.available | 2018-09-06T17:39:44Z | |
dc.date.issued | 2005-07 | |
dc.description | 17th Innovative Applications of Artificial Intelligence Conference (IAAI), Pittsburgh, Pennsylvania, July 2005. | |
dc.description.abstract | CycSecureTM is a network risk assessment and network monitoring application that relies on knowledge-based artificial intelligence technologies to improve on traditional network vulnerability assessment. CycSecure integrates public reports of software faults from online databases, data gathered automatically from computers on a network and hand-ontologized information about computers and computer networks. This information is stored in the Cyc® knowledge base (KB) and reasoned about by the Cyc inference engine and planner to provide detailed analyses of the security (and vulnerability) of networks. | en_US |
dc.description.uri | http://iral.cs.umbc.edu/Pubs/CycSecure.pdf | |
dc.format.extent | 6 PAGES | en_US |
dc.genre | conference papers and proceedings preprints | en_US |
dc.identifier | doi:10.13016/M2VD6P80P | |
dc.identifier.citation | Blake Shepard, Cynthia Matuszek, C. Bruce Fraser, William Wechtenhiser, David Crabbe, Zelal Gundordu, John Jantos, Todd Hughes, Larry Lefkowitz, Michael Witbrock, Doug Lenat, Erik Larson, A Knowledge-Based Approach to Network Security: Applying Cyc in the Domain of Network Risk Assessment, 17th Innovative Applications of Artificial Intelligence Conference (IAAI), Pittsburgh, Pennsylvania, July 2005. | en_US |
dc.identifier.uri | http://hdl.handle.net/11603/11247 | |
dc.language.iso | en_US | en_US |
dc.publisher | Association for the Advancement of Articifical Intelligence (AAAI) | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department Collection | |
dc.rights | This item may be protected under Title 17 of the U.S. Copyright Law. It is made available by UMBC for non-commercial research and education. For permission to publish or reproduce, please contact the author. | |
dc.subject | network risk assessment | en_US |
dc.subject | network monitoring | en_US |
dc.subject | Cyc® knowledge base (KB) | en_US |
dc.subject | analyses of the security of networks. | en_US |
dc.subject | Interactive Robotics and Language Lab | en_US |
dc.title | A Knowledge-Based Approach to Network Security: Applying Cyc in the Domain of Network Risk Assessment | en_US |
dc.type | Text | en_US |