{"id":"https://openalex.org/W4404031417","doi":"https://doi.org/10.1109/icccnt61001.2024.10726063","title":"Automatic Creation of Ontologies and Rules from ML Models for Access Control in IoT","display_name":"Automatic Creation of Ontologies and Rules from ML Models for Access Control in IoT","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4404031417","doi":"https://doi.org/10.1109/icccnt61001.2024.10726063"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt61001.2024.10726063","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt61001.2024.10726063","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053732014","display_name":"Surendra Tyagi","orcid":"https://orcid.org/0000-0003-1038-4282"},"institutions":[{"id":"https://openalex.org/I4210127441","display_name":"Indian Institute of Technology Jammu","ror":"https://ror.org/02f0vsw63","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210127441"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Surendra Tyagi","raw_affiliation_strings":["Indian Institute of Technology Jammu India,Computer Science &#x0026; Engineering,Jammu,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Jammu India,Computer Science &#x0026; Engineering,Jammu,India","institution_ids":["https://openalex.org/I4210127441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028565396","display_name":"Devesh C. Jinwala","orcid":"https://orcid.org/0000-0003-4830-1702"},"institutions":[{"id":"https://openalex.org/I42014448","display_name":"Sardar Vallabhbhai National Institute of Technology Surat","ror":"https://ror.org/02y394t43","country_code":"IN","type":"education","lineage":["https://openalex.org/I42014448"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Devesh C. Jinwala","raw_affiliation_strings":["S. V. National Institute of Technology,Computer Science &#x0026; Engineering,Surat,India"],"affiliations":[{"raw_affiliation_string":"S. V. National Institute of Technology,Computer Science &#x0026; Engineering,Surat,India","institution_ids":["https://openalex.org/I42014448"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040747134","display_name":"Subhasis Bhattacharjee","orcid":"https://orcid.org/0000-0002-3015-3388"},"institutions":[{"id":"https://openalex.org/I4210127441","display_name":"Indian Institute of Technology Jammu","ror":"https://ror.org/02f0vsw63","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210127441"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Subhasis Bhattacharjee","raw_affiliation_strings":["Indian Institute of Technology Jammu India,Computer Science &#x0026; Engineering,Jammu,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Jammu India,Computer Science &#x0026; Engineering,Jammu,India","institution_ids":["https://openalex.org/I4210127441"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5053732014"],"corresponding_institution_ids":["https://openalex.org/I4210127441"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.30819782,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9549999833106995,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9089000225067139,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7577154040336609},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4740300476551056},{"id":"https://openalex.org/keywords/ontology","display_name":"Ontology","score":0.4597836136817932},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.445246160030365},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4123843312263489},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3847053647041321},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.319966197013855},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3087403476238251},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21312007308006287}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7577154040336609},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4740300476551056},{"id":"https://openalex.org/C25810664","wikidata":"https://www.wikidata.org/wiki/Q44325","display_name":"Ontology","level":2,"score":0.4597836136817932},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.445246160030365},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4123843312263489},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3847053647041321},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.319966197013855},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3087403476238251},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21312007308006287},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt61001.2024.10726063","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt61001.2024.10726063","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W756990636","https://openalex.org/W1551055549","https://openalex.org/W1561517109","https://openalex.org/W1573538036","https://openalex.org/W1624661769","https://openalex.org/W1864285344","https://openalex.org/W2051448938","https://openalex.org/W2101400814","https://openalex.org/W2133466528","https://openalex.org/W2141040832","https://openalex.org/W2149706766","https://openalex.org/W2150365753","https://openalex.org/W2154829072","https://openalex.org/W2155849571","https://openalex.org/W2947332917","https://openalex.org/W3005110954","https://openalex.org/W3112686520","https://openalex.org/W4309077608","https://openalex.org/W4311053242","https://openalex.org/W4400762160","https://openalex.org/W4407723320","https://openalex.org/W6744347944","https://openalex.org/W6860280969","https://openalex.org/W6991957103"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660","https://openalex.org/W4238100021"],"abstract_inverted_index":{"Ontologies":[0,83,151,161],"have":[1],"been":[2,20],"increasingly":[3],"used":[4,22,34],"in":[5,10,135,145,190,213,278],"designing":[6,202],"access":[7,40,75,204,220,275],"control":[8,41,76,205,221,276],"policies":[9,222],"Internet":[11],"of":[12,71,108,150,193,217,266,292],"Things":[13],"(IoT)":[14],"systems.":[15,206],"Machine":[16],"Learning":[17],"(ML)":[18],"has":[19],"extensively":[21],"to":[23,50,67,119],"identify":[24],"patterns":[25],"from":[26,87,155,232,238],"existing":[27],"data.":[28],"Trained":[29],"ML":[30,52,72,89,239],"models":[31,53],"can":[32,261],"be":[33],"on":[35,245],"end":[36],"devices":[37,253],"for":[38,42,73,81,101,106,132,179,251,295],"applying":[39],"resources":[43,259],"and":[44,57,84,113,152,162,177,196,215,257],"users.":[45],"However":[46],"it":[47],"is":[48],"unreasonable":[49],"deploy":[51],"into":[54,172],"the":[55,69,133,136,191,218,229,296],"low-powered":[56],"mostly":[58],"hand-held":[59],"IoT":[60,252],"devices.":[61],"This":[62],"paper":[63],"demonstrates":[64,186],"an":[65,116,173],"attempt":[66],"exploit":[68],"power":[70],"generating":[74,82],"rules.":[77,268],"We":[78,226,241],"propose":[79,243],"algorithms":[80],"policy":[85,153,267],"rules":[86,154,168],"trained":[88,156],"models.":[90,158],"Motivated":[91],"by":[92,121,223],"their":[93],"simple":[94],"design,":[95,112],"low":[96],"or":[97],"almost":[98],"no":[99,104],"requirement":[100,105],"data":[102],"preprocessing,":[103],"scaling/normalization":[107],"data,":[109],"simple,":[110],"intuitive":[111],"most":[114],"essentially":[115],"inherent":[117],"ability":[118],"optimize,":[120],"handling":[122],"irrelevant":[123],"features":[124],"through":[125],"pruning,":[126],"we":[127,143,209,236],"use":[128],"Decision":[129],"Trees":[130],"(DT)":[131],"classification":[134],"proposed":[137,270],"approach.":[138],"For":[139],"smart":[140],"home":[141],"dataset,":[142],"show":[144],"this":[146],"paper,":[147],"automatic":[148],"creation":[149],"DT":[157,246],"The":[159,269],"resulting":[160],"Semantic":[163],"Web":[164],"Rule":[165],"Language":[166],"(SWRL)":[167],"are":[169],"then":[170],"deployed":[171],"Ontological":[174],"framework":[175],"(Protege)":[176],"tested":[178],"consistency":[180,212],"using":[181],"a":[182,187,198,248,273,279,289],"Reasoner.":[183],"Our":[184,286],"approach":[185],"significant":[188],"improvement":[189],"efficiency":[192],"rule":[194],"generation":[195],"offers":[197],"promising":[199],"direction":[200],"towards":[201],"automated":[203],"In":[207],"Protege,":[208],"achieve":[210],"100%":[211],"deployment":[214],"testing":[216],"generated":[219],"firing":[224],"queries.":[225],"obtain":[227],"exactly":[228],"same":[230],"accuracy":[231],"Protege":[233],"queries":[234],"as":[235,247],"get":[237],"model.":[240],"also":[242],"pruning":[244],"fall-back":[249],"method":[250,271],"with":[254],"limited":[255,264],"computing":[256],"memory":[258],"that":[260],"handle":[262],"only":[263],"number":[265],"creates":[272],"deployable":[274],"system":[277],"few":[280],"minutes":[281,294],"without":[282],"any":[283],"human":[284],"intervention.":[285],"experiment":[287],"shows":[288],"turnaround":[290],"time":[291],"$\\mathbf{5}$":[293],"Smart":[297],"Home":[298],"dataset.":[299]},"counts_by_year":[],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
