<?xml version="1.0"?>

<!DOCTYPE owl [
	<!ENTITY rdf "http://www.w3.org/1999/02/22-rdf-syntax-ns#">
	<!ENTITY rdfs "http://www.w3.org/2000/01/rdf-schema#">
	<!ENTITY xsd "http://www.w3.org/2001/XMLSchema#">
	<!ENTITY owl "http://www.w3.org/2002/07/owl#">
	<!ENTITY cc "http://web.resource.org/cc/#">
	<!ENTITY project "http://ebiquity.umbc.edu/ontology/project.owl#">
	<!ENTITY person "http://ebiquity.umbc.edu/ontology/person.owl#">
	<!ENTITY pub "http://ebiquity.umbc.edu/ontology/publication.owl#">
	<!ENTITY assert "http://ebiquity.umbc.edu/ontology/assertion.owl#">
]>

<!--

This ontology document is licensed under the Creative Commons
Attribution License. To view a copy of this license, visit
http://creativecommons.org/licenses/by/2.0/ or send a letter to
Creative Commons, 559 Nathan Abbott Way, Stanford, California
94305, USA.

-->

<rdf:RDF 
		xmlns:rdf = "&rdf;"
		xmlns:rdfs = "&rdfs;"
		xmlns:xsd = "&xsd;"
		xmlns:owl = "&owl;"
		xmlns:cc = "&cc;"
		xmlns:project = "&project;"
		xmlns:person = "&person;"
		xmlns:pub = "&pub;"
		xmlns:assert = "&assert;">
	<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1009/Cybersecurity-Knowledge-Graph-Improvement-with-Graph-Neural-Networks">
		<rdfs:label><![CDATA[Cybersecurity Knowledge Graph Improvement with Graph Neural Networks]]></rdfs:label>
		<pub:title><![CDATA[Cybersecurity Knowledge Graph Improvement with Graph Neural Networks]]></pub:title>
		<pub:publishedOn rdf:datatype="&xsd;dateTime">2021-12-15T00:00:00-05:00</pub:publishedOn>
		<pub:abstract><![CDATA[Cybersecurity Knowledge Graphs (CKGs) help in
aggregating information about cyber-events. CKGs combined
with reasoning and querying systems such as SPARQL enable
security researchers to look up information about past cyberevents
that is helpful in understanding future cyber-events or
drawing similarity with a known cyber-event recorded in a
CKG. CKGs have assertions in the form of semantic triples. The
triples describe a relationship between a subject and object, both
of which are cybersecurity entities. The quality of information
present in the CKG depends on the data source. Since data
sources can have varying degrees of reliability, we need a
score that should help us benchmark the veracity of the CKG
assertions. Verifying the information asserted in the CKG is a
challenging task. In this paper, we describe a novel method that
associates a score with the semantic triples asserted in the CKG
using deep learning. We use semantic triples that we know are
correct, in a supervised machine learning algorithm that produces
the output for each relationship. In particular, we use Graph
Convolutional Neural Networks (GCN) on a dataset of CKGs
that can be used to ascertain the scores for each semantic triple.

<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@ebiquity">
<meta name="twitter:creator" content="@ebiquity" />
<meta property="og:image" content="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2022/01/Cybersecurity_Knowledge_Graph_Improvement_with_Graph_Neural_Networks-1-1.png" >
<meta property="og:title" content="Cybersecurity Knowledge Graph Improvement with Graph Neural Networks" >
<meta name="twitter:image" content="https://ebiquity.umbc.edu/blogger/wp-content/uploads/2022/01/Cybersecurity_Knowledge_Graph_Improvement_with_Graph_Neural_Networks-1-1.png">]]></pub:abstract>
		<pub:counter>876</pub:counter>
		<pub:booktitle><![CDATA[International Conference on Big Data]]></pub:booktitle>
		<pub:publisher><![CDATA[IEEE]]></pub:publisher>
		<pub:author>
			<rdf:List>
				<rdf:first>
					<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</rdf:first>
				<rdf:rest>					<rdf:List>
						<rdf:first>
							<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Priyanka/Ranade"><person:name><![CDATA[Priyanka Ranade]]></person:name><rdfs:label><![CDATA[Priyanka Ranade]]></rdfs:label></person:Person>
						</rdf:first>
						<rdf:rest>							<rdf:List>
								<rdf:first>
									<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Aritran/Piplai"><person:name><![CDATA[Aritran Piplai]]></person:name><rdfs:label><![CDATA[Aritran Piplai]]></rdfs:label></person:Person>
								</rdf:first>
								<rdf:rest>									<rdf:List>
										<rdf:first>
											<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Soham/Dasgupta"><person:name><![CDATA[Soham Dasgupta]]></person:name><rdfs:label><![CDATA[Soham Dasgupta]]></rdfs:label></person:Person>
										</rdf:first>
										<rdf:rest rdf:resource="&rdf;nil" />
									</rdf:List>
								</rdf:rest>
							</rdf:List>
						</rdf:rest>
					</rdf:List>
				</rdf:rest>
			</rdf:List>
		</pub:author>
		<pub:firstAuthor>
<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
		</pub:firstAuthor>
		<pub:softCopy><pub:SoftCopy>
			<pub:softCopyFormat><![CDATA[PDF Document]]></pub:softCopyFormat>
			<pub:softCopyURI><![CDATA[http://ebiquity.umbc.edu/get/a/publication/1133.pdf]]></pub:softCopyURI>
			<pub:softCopySize>616210</pub:softCopySize>
			</pub:SoftCopy>
			</pub:softCopy>
	</pub:InProceedings>

<rdf:Description rdf:about="">
	<cc:License rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
</rdf:Description>

</rdf:RDF>
