dc.contributor.author | Vitkus, Donatas | |
dc.contributor.author | Steckevičius, Žilvinas | |
dc.contributor.author | Goranin, Nikolaj | |
dc.contributor.author | Kalibatienė, Diana | |
dc.contributor.author | Čenys, Antanas | |
dc.date.accessioned | 2023-09-18T17:18:23Z | |
dc.date.available | 2023-09-18T17:18:23Z | |
dc.date.issued | 2019 | |
dc.identifier.issn | 1841-9836 | |
dc.identifier.uri | https://etalpykla.vilniustech.lt/handle/123456789/121758 | |
dc.description.abstract | Information security risk analysis is a compulsory requirement both from the side of regulating documents and information security management decision making process. Some researchers propose using expert systems (ES) for process automation, but this approach requires the creation of a high-quality knowledge base. A knowledge base can be formed both from expert knowledge or information collected from other sources of information. The problem of such approach is that experts or good quality knowledge sources are expensive. In this paper we propose the problem solution by providing an automated ES knowledge base development method. The method proposed is novel since unlike other methods it does not integrate ontology directly but utilizes automated transformation of existing information security ontology elements into ES rules: The Web Ontology Rule Language (OWL RL) subset of ontology is segregated into Resource Description Framework (RDF) triplets, that are transformed into Rule Interchange Format (RIF); RIF rules are converted into Java Expert System Shell (JESS) knowledge base rules. The experiments performed have shown the principal method applicability. The created knowledge base was later verified by performing comparative risk analysis in a sample company. | eng |
dc.format | PDF | |
dc.format.extent | p. 743-758 | |
dc.format.medium | tekstas / txt | |
dc.language.iso | eng | |
dc.relation.isreferencedby | DOAJ | |
dc.relation.isreferencedby | Science Citation Index Expanded (Web of Science) | |
dc.relation.isreferencedby | Scopus | |
dc.rights | Laisvai prieinamas internete | |
dc.source.uri | https://doi.org/10.15837/ijccc.2019.6.3668 | |
dc.source.uri | http://univagora.ro/jour/index.php/ijccc/article/view/3668 | |
dc.source.uri | https://talpykla.elaba.lt/elaba-fedora/objects/elaba:46468857/datastreams/MAIN/content | |
dc.title | Automated expert system knowledge base development method for information security risk analysis | |
dc.type | Straipsnis Web of Science DB / Article in Web of Science DB | |
dcterms.accessRights | This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. | |
dcterms.references | 51 | |
dc.type.pubtype | S1 - Straipsnis Web of Science DB / Web of Science DB article | |
dc.contributor.institution | Vilniaus Gedimino technikos universitetas | |
dc.contributor.faculty | Fundamentinių mokslų fakultetas / Faculty of Fundamental Sciences | |
dc.subject.researchfield | T 007 - Informatikos inžinerija / Informatics engineering | |
dc.subject.researchfield | N 009 - Informatika / Computer science | |
dc.subject.vgtuprioritizedfields | IK0101 - Informacijos ir informacinių technologijų sauga / Information and Information Technologies Security | |
dc.subject.ltspecializations | L106 - Transportas, logistika ir informacinės ir ryšių technologijos (IRT) / Transport, logistic and information and communication technologies | |
dc.subject.en | information security risk analysis | |
dc.subject.en | ontology | |
dc.subject.en | knowledge base | |
dc.subject.en | expert system | |
dc.subject.en | transformation | |
dc.subject.en | RIF | |
dc.subject.en | JESS | |
dcterms.sourcetitle | International journal of computers, communications and control | |
dc.description.issue | iss. 6 | |
dc.description.volume | vol. 14 | |
dc.publisher.name | Agora University | |
dc.publisher.city | Oradea | |
dc.identifier.doi | 000499321100008 | |
dc.identifier.doi | 10.15837/ijccc.2019.6.3668 | |
dc.identifier.elaba | 46468857 | |