35 research outputs found
Information Security Risk Management: In Which Security Solutions Is It Worth Investing?
As companies are increasingly exposed to information security threats, decision makers are permanently forced to pay attention to security issues. Information security risk management provides an approach for measuring the security through risk assessment, risk mitigation, and risk evaluation. Although a variety of approaches have been proposed, decision makers lack well-founded techniques that (1) show them what they are getting for their investment, (2) show them if their investment is efficient, and (3) do not demand in-depth knowledge of the IT security domain. This article defines a methodology for management decision makers that effectively addresses these problems. This work involves the conception, design, and implementation of the methodology into a software solution. The results from two qualitative case studies show the advantages of this methodology in comparison to established methodologies
Describing and Organizing Semantic Web and Machine Learning Systems in the SWeMLS-KG
In line with the general trend in artificial intelligence research to create
intelligent systems that combine learning and symbolic components, a new
sub-area has emerged that focuses on combining machine learning (ML) components
with techniques developed by the Semantic Web (SW) community - Semantic Web
Machine Learning (SWeML for short). Due to its rapid growth and impact on
several communities in the last two decades, there is a need to better
understand the space of these SWeML Systems, their characteristics, and trends.
Yet, surveys that adopt principled and unbiased approaches are missing. To fill
this gap, we performed a systematic study and analyzed nearly 500 papers
published in the last decade in this area, where we focused on evaluating
architectural, and application-specific features. Our analysis identified a
rapidly growing interest in SWeML Systems, with a high impact on several
application domains and tasks. Catalysts for this rapid growth are the
increased application of deep learning and knowledge graph technologies. By
leveraging the in-depth understanding of this area acquired through this study,
a further key contribution of this paper is a classification system for SWeML
Systems which we publish as ontology.Comment: Preprint of a paper in the resource track of the 20th Extended
Semantic Web Conference (ESWC'23
Combining machine learning and semantic web: A systematic mapping study
In line with the general trend in artificial intelligence research to create intelligent systems that combine learning and symbolic components, a new sub-area has emerged that focuses on combining Machine Learning components with techniques developed by the Semantic Web community - Semantic Web Machine Learning (SWeML). Due to its rapid growth and impact on several communities in thepast two decades, there is a need to better understand the space of these SWeML Systems, their characteristics, and trends. Yet, surveys that adopt principled and unbiased approaches are missing. To fill this gap, we performed a systematic study and analyzed nearly 500 papers published in the past decade in this area, where we focused on evaluating architectural and application-specific features. Our analysis identified a rapidly growing interest in SWeML Systems, with a high impact on several application domains and tasks. Catalysts for this rapid growth are the increased application of deep learning and knowledge graph technologies. By leveraging the in-depth understanding of this area acquired through this study, a further key contribution of this article is a classification system for SWeML Systems that we publish as ontology.</p
Formalizing information security knowledge
Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for information security domain knowledge. Besides existing best-practice guidelines such as the German IT Grundschutz Manual also concrete knowledge of the considered organization is incorporated. An evaluation conducted by an information security expert team has shown that this knowledge model can be used to support a broad range of information security risk management approaches