<?xml version="1.0"?>

<!DOCTYPE owl [
	<!ENTITY rdf "http://www.w3.org/1999/02/22-rdf-syntax-ns#">
	<!ENTITY rdfs "http://www.w3.org/2000/01/rdf-schema#">
	<!ENTITY xsd "http://www.w3.org/2001/XMLSchema#">
	<!ENTITY owl "http://www.w3.org/2002/07/owl#">
	<!ENTITY cc "http://web.resource.org/cc/#">
	<!ENTITY project "http://ebiquity.umbc.edu/ontology/project.owl#">
	<!ENTITY person "http://ebiquity.umbc.edu/ontology/person.owl#">
	<!ENTITY pub "http://ebiquity.umbc.edu/ontology/publication.owl#">
	<!ENTITY assert "http://ebiquity.umbc.edu/ontology/assertion.owl#">
]>

<!--

This ontology document is licensed under the Creative Commons
Attribution License. To view a copy of this license, visit
http://creativecommons.org/licenses/by/2.0/ or send a letter to
Creative Commons, 559 Nathan Abbott Way, Stanford, California
94305, USA.

-->

<rdf:RDF 
		xmlns:rdf = "&rdf;"
		xmlns:rdfs = "&rdfs;"
		xmlns:xsd = "&xsd;"
		xmlns:owl = "&owl;"
		xmlns:cc = "&cc;"
		xmlns:project = "&project;"
		xmlns:person = "&person;"
		xmlns:pub = "&pub;"
		xmlns:assert = "&assert;">
	<pub:PhdThesis rdf:about="http://ebiquity.umbc.edu/paper/html/id/1134/Knowledge-for-Cyber-Threat-Intelligence">
		<rdfs:label><![CDATA[Knowledge for Cyber Threat Intelligence]]></rdfs:label>
		<pub:title><![CDATA[Knowledge for Cyber Threat Intelligence]]></pub:title>
		<pub:publishedOn rdf:datatype="&xsd;dateTime">2019-05-01T00:00:00-05:00</pub:publishedOn>
		<pub:abstract><![CDATA[Keeping up with threat intelligence is a must for a security analyst today.
There is a volume of information present in 'the wild' that affects an organization.
We need to develop an artificial intelligence system that scours the intelligence
sources, to keep the analyst updated about various threats that pose a risk to her
organization. A security analyst who is better 'tapped in' can be more effective.
In this thesis, we present, Cyber-All-Intel an artificial intelligence system to
aid a security analyst. It is a system for knowledge extraction, representation, and
analytics in an end-to-end pipeline grounded in the cybersecurity informatics domain.
It uses multiple knowledge representations, like vector spaces and knowledge
graphs, in a "VKG structure" to store incoming intelligence. The system also uses
neural network models to proactively improve its knowledge. We have also created
a query engine and an alert system that can be used by an analyst to find actionable
cybersecurity insights.]]></pub:abstract>
		<pub:organization><![CDATA[University of Maryland, Baltimore County]]></pub:organization>
		<pub:counter>340</pub:counter>
		<pub:author>
			<rdf:List>
				<rdf:first>
					<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sudip/Mittal"><person:name><![CDATA[Sudip Mittal]]></person:name><rdfs:label><![CDATA[Sudip Mittal]]></rdfs:label></person:Person>
				</rdf:first>
				<rdf:rest rdf:resource="&rdf;nil" />
			</rdf:List>
		</pub:author>
		<pub:firstAuthor>
<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sudip/Mittal"><person:name><![CDATA[Sudip Mittal]]></person:name><rdfs:label><![CDATA[Sudip Mittal]]></rdfs:label></person:Person>
		</pub:firstAuthor>
		<pub:softCopy><pub:SoftCopy>
			<pub:softCopyFormat><![CDATA[PDF Document]]></pub:softCopyFormat>
			<pub:softCopyURI><![CDATA[http://ebiquity.umbc.edu/get/a/publication/1289.pdf]]></pub:softCopyURI>
			<pub:softCopySize>2691967</pub:softCopySize>
			</pub:SoftCopy>
			</pub:softCopy>
	</pub:PhdThesis>

<rdf:Description rdf:about="">
	<cc:License rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
</rdf:Description>

</rdf:RDF>
