{"id":"https://openalex.org/W4402991926","doi":"https://doi.org/10.1631/fitee.2300662","title":"OntoCSD: an ontology-based security model for an integrated solution of cyberspace defense","display_name":"OntoCSD: an ontology-based security model for an integrated solution of cyberspace defense","publication_year":2024,"publication_date":"2024-09-01","ids":{"openalex":"https://openalex.org/W4402991926","doi":"https://doi.org/10.1631/fitee.2300662"},"language":"en","primary_location":{"id":"doi:10.1631/fitee.2300662","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1631/fitee.2300662","pdf_url":null,"source":{"id":"https://openalex.org/S4210189857","display_name":"Frontiers of Information Technology & Electronic Engineering","issn_l":"2095-9184","issn":["2095-9184","2095-9230"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Information Technology &amp; Electronic Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102857532","display_name":"Dandan Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dandan Wu","raw_affiliation_strings":["School of Computer Science, Chengdu College of University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Chengdu College of University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711","https://openalex.org/I24201400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108047474","display_name":"Jie Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]},{"id":"https://openalex.org/I2800372957","display_name":"China Electronics Technology Group Corporation","ror":"https://ror.org/0098hst83","country_code":"CN","type":"company","lineage":["https://openalex.org/I2800372957"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Chen","raw_affiliation_strings":["China Electronics Technology Cyber Security Co., Ltd., Chengdu, China","School of Cybersecurity, Northwestern Polytechnical University, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"China Electronics Technology Cyber Security Co., Ltd., Chengdu, China","institution_ids":["https://openalex.org/I2800372957"]},{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University, Xi\u2019an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100936394","display_name":"Ruiyun Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I2800372957","display_name":"China Electronics Technology Group Corporation","ror":"https://ror.org/0098hst83","country_code":"CN","type":"company","lineage":["https://openalex.org/I2800372957"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruiyun Xie","raw_affiliation_strings":["China Electronics Technology Cyber Security Co., Ltd., Chengdu, China"],"affiliations":[{"raw_affiliation_string":"China Electronics Technology Cyber Security Co., Ltd., Chengdu, China","institution_ids":["https://openalex.org/I2800372957"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100627368","display_name":"Kexin Chen","orcid":"https://orcid.org/0000-0003-4248-7681"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Chen","raw_affiliation_strings":["School of Computer Science, Chengdu College of University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Chengdu College of University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711","https://openalex.org/I24201400"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5102857532"],"corresponding_institution_ids":["https://openalex.org/I150229711","https://openalex.org/I24201400"],"apc_list":null,"apc_paid":null,"fwci":0.7794,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.79252387,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"25","issue":"9","first_page":"1209","last_page":"1225"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9829999804496765,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.9280827045440674},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6275638937950134},{"id":"https://openalex.org/keywords/ontology","display_name":"Ontology","score":0.6072674989700317},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5069675445556641},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.25256532430648804},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.15987303853034973}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.9280827045440674},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6275638937950134},{"id":"https://openalex.org/C25810664","wikidata":"https://www.wikidata.org/wiki/Q44325","display_name":"Ontology","level":2,"score":0.6072674989700317},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5069675445556641},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.25256532430648804},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.15987303853034973},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1631/fitee.2300662","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1631/fitee.2300662","pdf_url":null,"source":{"id":"https://openalex.org/S4210189857","display_name":"Frontiers of Information Technology & Electronic Engineering","issn_l":"2095-9184","issn":["2095-9184","2095-9230"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Information Technology &amp; Electronic Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1418086826","https://openalex.org/W1983551905","https://openalex.org/W2592589264","https://openalex.org/W2788031953","https://openalex.org/W2790843555","https://openalex.org/W2962939608","https://openalex.org/W2980659949","https://openalex.org/W2995609070","https://openalex.org/W3031935844","https://openalex.org/W3039697228","https://openalex.org/W3128863316","https://openalex.org/W3212330586","https://openalex.org/W4211251805","https://openalex.org/W4226071669","https://openalex.org/W4300772332","https://openalex.org/W4307128448","https://openalex.org/W4383609773"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2368745349","https://openalex.org/W3167675181","https://openalex.org/W2372005904","https://openalex.org/W144012884","https://openalex.org/W2360897455","https://openalex.org/W2131575257","https://openalex.org/W2377660959","https://openalex.org/W4251169878"],"abstract_inverted_index":{"The":[0],"construction":[1],"of":[2,68,84,148,183,200],"an":[3,38,59,65,122,196],"integrated":[4,49,66,197],"solution":[5,50,67,198],"for":[6,64],"cyberspace":[7,69,184,201],"defense":[8,70,90,119,160,185],"with":[9],"dynamic,":[10],"flexible,":[11],"and":[12,44,82,89,93,118,140,151,168,173,192,194],"intelligent":[13],"features":[14],"is":[15,133],"a":[16,47,138,156],"new":[17],"idea.":[18],"To":[19],"solve":[20,177],"the":[21,79,102,115,169,178,181],"problem":[22],"whereby":[23],"traditional":[24],"static":[25],"protection":[26],"methods":[27],"cannot":[28],"respond":[29],"to":[30,45,54,77,100,135,176],"various":[31],"network":[32,40,112,159],"attacks":[33],"or":[34],"security":[35,61,116],"demands":[36],"in":[37,42,91,155,180],"adversarial":[39],"environment":[41],"time,":[43],"form":[46],"complete":[48],"from":[51],"\u201cthreat":[52],"discovery\u201d":[53],"\u201cdecision-making":[55],"generation,\u201d":[56],"we":[57],"propose":[58],"ontology-based":[60],"model,":[62],"OntoCSD,":[63],"that":[71],"uses":[72,94],"Web":[73,96],"ontology":[74,80],"language":[75,98],"(OWL)":[76],"represent":[78],"classes":[81],"relationships":[83,110],"threat":[85],"monitoring,":[86],"decision-making,":[87],"response,":[88],"cyberspace,":[92],"semantic":[95],"rule":[97],"(SWRL)":[99],"design":[101],"defensive":[103],"reasoning":[104,131],"rules.":[105],"OntoCSD":[106,188],"can":[107],"discover":[108],"potential":[109],"among":[111],"attacks,":[113],"vulnerabilities,":[114],"state,":[117],"strategies.":[120],"Further,":[121],"artificial":[123],"intelligence":[124],"(AI)":[125],"expert":[126],"system":[127],"based":[128],"on":[129,165],"case-based":[130],"(CBR)":[132],"used":[134],"quickly":[136],"generate":[137],"detailed":[139],"comprehensive":[141],"decision-making":[142],"scheme.":[143],"Finally,":[144],"through":[145],"Kendall\u2019s":[146],"coefficient":[147],"concordance":[149],"(W)":[150],"four":[152],"experimental":[153],"cases":[154],"typical":[157],"computer":[158],"(CND)":[161],"system,":[162],"which":[163],"reasons":[164],"represented":[166],"facts":[167],"ontology,":[170],"OntoCSD\u2019s":[171],"consistency":[172],"its":[174],"feasibility":[175],"issues":[179],"field":[182],"are":[186],"validated.":[187],"supports":[189],"automatic":[190],"association":[191],"reasoning,":[193],"provides":[195],"framework":[199],"defense.":[202]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
