<?xml version="1.0"?>

<!DOCTYPE owl [
	<!ENTITY rdf "http://www.w3.org/1999/02/22-rdf-syntax-ns#">
	<!ENTITY rdfs "http://www.w3.org/2000/01/rdf-schema#">
	<!ENTITY xsd "http://www.w3.org/2001/XMLSchema#">
	<!ENTITY owl "http://www.w3.org/2002/07/owl#">
	<!ENTITY cc "http://web.resource.org/cc/#">
	<!ENTITY project "http://ebiquity.umbc.edu/ontology/project.owl#">
	<!ENTITY person "http://ebiquity.umbc.edu/ontology/person.owl#">
	<!ENTITY pub "http://ebiquity.umbc.edu/ontology/publication.owl#">
	<!ENTITY assert "http://ebiquity.umbc.edu/ontology/assertion.owl#">
]>

<!--

This ontology document is licensed under the Creative Commons
Attribution License. To view a copy of this license, visit
http://creativecommons.org/licenses/by/2.0/ or send a letter to
Creative Commons, 559 Nathan Abbott Way, Stanford, California
94305, USA.

-->

<rdf:RDF 
		xmlns:rdf = "&rdf;"
		xmlns:rdfs = "&rdfs;"
		xmlns:xsd = "&xsd;"
		xmlns:owl = "&owl;"
		xmlns:cc = "&cc;"
		xmlns:project = "&project;"
		xmlns:person = "&person;"
		xmlns:pub = "&pub;"
		xmlns:assert = "&assert;">
	<pub:Misc rdf:about="http://ebiquity.umbc.edu/paper/html/id/1006/Combating-Fake-Cyber-Threat-Intelligence-using-Provenance-in-Cybersecurity-Knowledge-Graphs">
		<rdfs:label><![CDATA[Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs]]></rdfs:label>
		<pub:title><![CDATA[Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs]]></pub:title>
		<pub:publishedOn rdf:datatype="&xsd;dateTime">2022-01-01T00:00:00-05:00</pub:publishedOn>
		<pub:abstract><![CDATA[Today there is a significant amount of fake cybersecurity related intelligence on the internet. To filter out such information, we build a system to capture the provenance information and represent it along with the captured Cyber Threat Intelligence (CTI). In the cybersecurity domain, such CTI is stored in Cybersecurity Knowledge Graphs (CKG). We enhance the exiting CKG model to incorporate intelligence provenance and fuse provenance graphs with CKG. This process includes modifying traditional approaches to entity and relation extraction. CTI data is considered vital in securing our cyberspace. Knowledge graphs containing CTI information along with its provenance can provide expertise to dependent Artificial Intelligence (AI) systems and human analysts.

<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@ebiquity">
<meta name="twitter:creator" content="@ebiquity" />
<meta property="og:image" content="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2021/12/ckg_prov.png"/>
<meta property="og:url" content="https://ebiquity.umbc.edu/paper/html/id/1006/Combating-Fake-Cyber-Threat-Intelligence-using-Provenance-in-Cybersecurity-Knowledge-Graphs" />
<meta property="og:title" content="Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs" />
<meta property="og:description" content="This new paper describes a system that identifies and filters out fake cyber threat intelligence from documents and open-source feeds using provenance information, representing the results in a cybersecurity knowledge graph (CKG)." />
<meta name="twitter:image" content="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2021/12/ckg_prov.png">]]></pub:abstract>
		<pub:note><![CDATA[<img src="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2021/12/ckg_prov.png" style="display: block; margin-left: auto; margin-right: auto; max-width: 100%; height: auto;">
<meta name="twitter:image" content="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2021/12/ckg_prov.png">]]></pub:note>
		<pub:counter>1704</pub:counter>
		<pub:tag><![CDATA[cybersecurity]]></pub:tag>
		<pub:tag><![CDATA[knowledge graph]]></pub:tag>
		<pub:tag><![CDATA[provenance]]></pub:tag>
		<pub:booktitle><![CDATA[IEEE International Conference on Big Data 2021]]></pub:booktitle>
		<pub:publisher><![CDATA[IEEE]]></pub:publisher>
		<pub:author>
			<rdf:List>
				<rdf:first>
					<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</rdf:first>
				<rdf:rest>					<rdf:List>
						<rdf:first>
							<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sudip/Mittal"><person:name><![CDATA[Sudip Mittal]]></person:name><rdfs:label><![CDATA[Sudip Mittal]]></rdfs:label></person:Person>
						</rdf:first>
						<rdf:rest>							<rdf:List>
								<rdf:first>
									<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Aritran/Piplai"><person:name><![CDATA[Aritran Piplai]]></person:name><rdfs:label><![CDATA[Aritran Piplai]]></rdfs:label></person:Person>
								</rdf:first>
								<rdf:rest>									<rdf:List>
										<rdf:first>
											<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Shaswata/Mitra"><person:name><![CDATA[Shaswata Mitra]]></person:name><rdfs:label><![CDATA[Shaswata Mitra]]></rdfs:label></person:Person>
										</rdf:first>
										<rdf:rest rdf:resource="&rdf;nil" />
									</rdf:List>
								</rdf:rest>
							</rdf:List>
						</rdf:rest>
					</rdf:List>
				</rdf:rest>
			</rdf:List>
		</pub:author>
		<pub:firstAuthor>
<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
		</pub:firstAuthor>
		<pub:softCopy><pub:SoftCopy>
			<pub:softCopyFormat><![CDATA[PDF Document]]></pub:softCopyFormat>
			<pub:softCopyURI><![CDATA[http://ebiquity.umbc.edu/get/a/publication/1127.pdf]]></pub:softCopyURI>
			<pub:softCopySize>859130</pub:softCopySize>
			</pub:SoftCopy>
			</pub:softCopy>
	</pub:Misc>

<rdf:Description rdf:about="">
	<cc:License rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
</rdf:Description>

</rdf:RDF>
