Protecting digital assets using an ontology based cyber situational awareness system
Cyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive methodology that integrates the Isolation Forest and autoencoder algorithms, Structured Threat Information Expression (STIX) implementation, and ontology dev...
Saved in:
Published in | Frontiers in artificial intelligence Vol. 7; p. 1394363 |
---|---|
Main Authors | , , , , , , , |
Format | Journal Article |
Language | English |
Published |
Switzerland
Frontiers Media S.A
09.01.2025
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Cyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive methodology that integrates the Isolation Forest and autoencoder algorithms, Structured Threat Information Expression (STIX) implementation, and ontology development to enhance cybersecurity threat detection and intelligence. The Isolation Forest algorithm excels in anomaly detection in high-dimensional datasets, while autoencoders provide nonlinear detection capabilities and adaptive feature learning. Together, they form a robust framework for proactive anomaly detection.
The proposed methodology leverages the Isolation Forest for efficient anomaly identification and autoencoders for feature learning and nonlinear anomaly detection. Threat information was standardized using the STIX framework, facilitating structured and dynamic assessment of threat intelligence. Ontology development was employed to represent knowledge systematically and enable semantic correlation of threats. Feature mapping enriched datasets with contextual threat information.
The proposed dual-algorithm framework demonstrated superior performance, achieving 95% accuracy, a 99% F1 score, and a 94.60% recall rate. These results outperformed the benchmarks, highlighting the model's effectiveness in proactive anomaly detection and cyber situational awareness enhancement.
The integration of STIX and ontology development within the proposed methodology significantly enhanced threat information standardization and semantic analysis. The dual-algorithm approach provided improved detection capabilities compared to traditional methods, underscoring its potential for scalable and effective cybersecurity applications. Future research could explore further optimization and real-world deployments to refine and validate the approach. |
---|---|
AbstractList | Cyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive methodology that integrates the Isolation Forest and autoencoder algorithms, Structured Threat Information Expression (STIX) implementation, and ontology development to enhance cybersecurity threat detection and intelligence. The Isolation Forest algorithm excels in anomaly detection in high-dimensional datasets, while autoencoders provide nonlinear detection capabilities and adaptive feature learning. Together, they form a robust framework for proactive anomaly detection.IntroductionCyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive methodology that integrates the Isolation Forest and autoencoder algorithms, Structured Threat Information Expression (STIX) implementation, and ontology development to enhance cybersecurity threat detection and intelligence. The Isolation Forest algorithm excels in anomaly detection in high-dimensional datasets, while autoencoders provide nonlinear detection capabilities and adaptive feature learning. Together, they form a robust framework for proactive anomaly detection.The proposed methodology leverages the Isolation Forest for efficient anomaly identification and autoencoders for feature learning and nonlinear anomaly detection. Threat information was standardized using the STIX framework, facilitating structured and dynamic assessment of threat intelligence. Ontology development was employed to represent knowledge systematically and enable semantic correlation of threats. Feature mapping enriched datasets with contextual threat information.MethodsThe proposed methodology leverages the Isolation Forest for efficient anomaly identification and autoencoders for feature learning and nonlinear anomaly detection. Threat information was standardized using the STIX framework, facilitating structured and dynamic assessment of threat intelligence. Ontology development was employed to represent knowledge systematically and enable semantic correlation of threats. Feature mapping enriched datasets with contextual threat information.The proposed dual-algorithm framework demonstrated superior performance, achieving 95% accuracy, a 99% F1 score, and a 94.60% recall rate. These results outperformed the benchmarks, highlighting the model's effectiveness in proactive anomaly detection and cyber situational awareness enhancement.ResultsThe proposed dual-algorithm framework demonstrated superior performance, achieving 95% accuracy, a 99% F1 score, and a 94.60% recall rate. These results outperformed the benchmarks, highlighting the model's effectiveness in proactive anomaly detection and cyber situational awareness enhancement.The integration of STIX and ontology development within the proposed methodology significantly enhanced threat information standardization and semantic analysis. The dual-algorithm approach provided improved detection capabilities compared to traditional methods, underscoring its potential for scalable and effective cybersecurity applications. Future research could explore further optimization and real-world deployments to refine and validate the approach.DiscussionThe integration of STIX and ontology development within the proposed methodology significantly enhanced threat information standardization and semantic analysis. The dual-algorithm approach provided improved detection capabilities compared to traditional methods, underscoring its potential for scalable and effective cybersecurity applications. Future research could explore further optimization and real-world deployments to refine and validate the approach. IntroductionCyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive methodology that integrates the Isolation Forest and autoencoder algorithms, Structured Threat Information Expression (STIX) implementation, and ontology development to enhance cybersecurity threat detection and intelligence. The Isolation Forest algorithm excels in anomaly detection in high-dimensional datasets, while autoencoders provide nonlinear detection capabilities and adaptive feature learning. Together, they form a robust framework for proactive anomaly detection.MethodsThe proposed methodology leverages the Isolation Forest for efficient anomaly identification and autoencoders for feature learning and nonlinear anomaly detection. Threat information was standardized using the STIX framework, facilitating structured and dynamic assessment of threat intelligence. Ontology development was employed to represent knowledge systematically and enable semantic correlation of threats. Feature mapping enriched datasets with contextual threat information.ResultsThe proposed dual-algorithm framework demonstrated superior performance, achieving 95% accuracy, a 99% F1 score, and a 94.60% recall rate. These results outperformed the benchmarks, highlighting the model’s effectiveness in proactive anomaly detection and cyber situational awareness enhancement.DiscussionThe integration of STIX and ontology development within the proposed methodology significantly enhanced threat information standardization and semantic analysis. The dual-algorithm approach provided improved detection capabilities compared to traditional methods, underscoring its potential for scalable and effective cybersecurity applications. Future research could explore further optimization and real-world deployments to refine and validate the approach. Cyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive methodology that integrates the Isolation Forest and autoencoder algorithms, Structured Threat Information Expression (STIX) implementation, and ontology development to enhance cybersecurity threat detection and intelligence. The Isolation Forest algorithm excels in anomaly detection in high-dimensional datasets, while autoencoders provide nonlinear detection capabilities and adaptive feature learning. Together, they form a robust framework for proactive anomaly detection. The proposed methodology leverages the Isolation Forest for efficient anomaly identification and autoencoders for feature learning and nonlinear anomaly detection. Threat information was standardized using the STIX framework, facilitating structured and dynamic assessment of threat intelligence. Ontology development was employed to represent knowledge systematically and enable semantic correlation of threats. Feature mapping enriched datasets with contextual threat information. The proposed dual-algorithm framework demonstrated superior performance, achieving 95% accuracy, a 99% F1 score, and a 94.60% recall rate. These results outperformed the benchmarks, highlighting the model's effectiveness in proactive anomaly detection and cyber situational awareness enhancement. The integration of STIX and ontology development within the proposed methodology significantly enhanced threat information standardization and semantic analysis. The dual-algorithm approach provided improved detection capabilities compared to traditional methods, underscoring its potential for scalable and effective cybersecurity applications. Future research could explore further optimization and real-world deployments to refine and validate the approach. |
Author | Almoabady, Tariq Ammar Aborokbah, Majed M. Karthikeyan, P. Manimurugan, S. Alblawi, Yasser Mohammad Aldawood, Hussain Aljuhani, Ahmed Albalawi, Ahmad Emad |
AuthorAffiliation | 1 Faculty of Computers and Information Technology, University of Tabuk , Tabuk , Saudi Arabia 3 RV University , Bengaluru , India 2 NEOM , Tabuk , Saudi Arabia |
AuthorAffiliation_xml | – name: 2 NEOM , Tabuk , Saudi Arabia – name: 3 RV University , Bengaluru , India – name: 1 Faculty of Computers and Information Technology, University of Tabuk , Tabuk , Saudi Arabia |
Author_xml | – sequence: 1 givenname: Tariq Ammar surname: Almoabady fullname: Almoabady, Tariq Ammar – sequence: 2 givenname: Yasser Mohammad surname: Alblawi fullname: Alblawi, Yasser Mohammad – sequence: 3 givenname: Ahmad Emad surname: Albalawi fullname: Albalawi, Ahmad Emad – sequence: 4 givenname: Majed M. surname: Aborokbah fullname: Aborokbah, Majed M. – sequence: 5 givenname: S. surname: Manimurugan fullname: Manimurugan, S. – sequence: 6 givenname: Ahmed surname: Aljuhani fullname: Aljuhani, Ahmed – sequence: 7 givenname: Hussain surname: Aldawood fullname: Aldawood, Hussain – sequence: 8 givenname: P. surname: Karthikeyan fullname: Karthikeyan, P. |
BackLink | https://www.ncbi.nlm.nih.gov/pubmed/39850849$$D View this record in MEDLINE/PubMed |
BookMark | eNpVkU1r3DAQhkVJaD6aH5BL8bGX3erTa59KCW0TCLSH9CxG0shR8EqpJDfsv6-d3YbkIomZV88wPGfkKKaIhFwyuhai6z_7DGHNKZdrJnopWvGOnPKWy1XHGT969T4hF6U8UEq5ooox_p6ciL5TtJP9Kbn7lVNFW0McGheGUGFsoBSspZnKUoTYpFjTmIZdY6Cga-zOYG5KqBPUkOLy4QkyRiylKbtScfuBHHsYC14c7nPy-_u3u6vr1e3PHzdXX29XVrKurriFtuto76y0UlLwCtA7ao2iZuOssQ5ax0H2HqVSlHrFWzTcoW0lY8yJc3Kz57oED_oxhy3knU4Q9HMh5UFDrsGOqI2zfl5YdS330iP0lrWmkxt04K3pxcz6smc9TmaLzmKsGcY30LedGO71kP5qxjZKtZuF8OlAyOnPhKXqbSgWxxEipqlowVQ_rzkfc_Tj62EvU_57mQNsH7A5lZLRv0QY1Yt-vejXi3590C_-ATS5pns |
Cites_doi | 10.1007/s11277-021-09013-x 10.1016/j.cose.2022.103069 10.1007/s00502-015-0287-4 10.1109/ACCESS.2021.3128177 10.1109/TSG.2020.3046602 10.1109/ACCESS.2020.3009843 10.5267/j.ijdns.2024.1.007 10.1016/j.future.2022.12.006 10.1016/j.chb.2022.107520 10.1007/s12652-023-04750-2 10.3390/s19092148 10.1016/j.ifacol.2018.08.424 10.1109/ACCESS.2021.3099004 10.3390/app13095427 10.1002/spy2.331 10.1186/s42400-020-00060-8 10.1016/j.ijcip.2023.100657 10.1007/s10207-019-00433-2 10.3390/s23167273 10.1016/j.future.2020.08.010 10.3390/app13042331 10.1080/17517575.2024.2369952 10.1109/TCE.2022.3217974 10.1109/MCE.2021.3081874 |
ContentType | Journal Article |
Copyright | Copyright © 2025 Almoabady, Alblawi, Albalawi, Aborokbah, Manimurugan, Aljuhani, Aldawood and Karthikeyan. Copyright © 2025 Almoabady, Alblawi, Albalawi, Aborokbah, Manimurugan, Aljuhani, Aldawood and Karthikeyan. 2025 Almoabady, Alblawi, Albalawi, Aborokbah, Manimurugan, Aljuhani, Aldawood and Karthikeyan |
Copyright_xml | – notice: Copyright © 2025 Almoabady, Alblawi, Albalawi, Aborokbah, Manimurugan, Aljuhani, Aldawood and Karthikeyan. – notice: Copyright © 2025 Almoabady, Alblawi, Albalawi, Aborokbah, Manimurugan, Aljuhani, Aldawood and Karthikeyan. 2025 Almoabady, Alblawi, Albalawi, Aborokbah, Manimurugan, Aljuhani, Aldawood and Karthikeyan |
DBID | AAYXX CITATION NPM 7X8 5PM DOA |
DOI | 10.3389/frai.2024.1394363 |
DatabaseName | CrossRef PubMed MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef PubMed MEDLINE - Academic |
DatabaseTitleList | MEDLINE - Academic PubMed |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2624-8212 |
ExternalDocumentID | oai_doaj_org_article_bdcf8495862f4fea9c16b847edafcb93 PMC11755673 39850849 10_3389_frai_2024_1394363 |
Genre | Journal Article |
GroupedDBID | 53G 9T4 AAFWJ AAYXX ACXDI ADBBV ADMLS AFPKN ALMA_UNASSIGNED_HOLDINGS BCNDV CITATION GROUPED_DOAJ OK1 PGMZT RPM NPM 7X8 5PM |
ID | FETCH-LOGICAL-c418t-2ca68809dc4c440af5aefd0cb50b7dcbcda6d2a49fe45500f526eb2dec64111d3 |
IEDL.DBID | DOA |
ISSN | 2624-8212 |
IngestDate | Wed Aug 27 01:09:48 EDT 2025 Thu Aug 21 18:41:02 EDT 2025 Fri Jul 11 16:02:08 EDT 2025 Wed Feb 19 01:58:20 EST 2025 Tue Jul 01 01:29:57 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | structured threat information expression anomaly detection auto encoder isolation forest algorithm cyber situational awareness |
Language | English |
License | Copyright © 2025 Almoabady, Alblawi, Albalawi, Aborokbah, Manimurugan, Aljuhani, Aldawood and Karthikeyan. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms. |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c418t-2ca68809dc4c440af5aefd0cb50b7dcbcda6d2a49fe45500f526eb2dec64111d3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 Christian Diedrich, Otto von Guericke University Magdeburg, Germany Teja Swaroop Mylavarapu, Capital One, United States Edited by: Chathurika S. Wickramasinghe Brahmana, Capital One, United States Reviewed by: Šarūnas Grigaliūnas, Kaunas University of Technology, Lithuania |
OpenAccessLink | https://doaj.org/article/bdcf8495862f4fea9c16b847edafcb93 |
PMID | 39850849 |
PQID | 3159440594 |
PQPubID | 23479 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_bdcf8495862f4fea9c16b847edafcb93 pubmedcentral_primary_oai_pubmedcentral_nih_gov_11755673 proquest_miscellaneous_3159440594 pubmed_primary_39850849 crossref_primary_10_3389_frai_2024_1394363 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2025-01-09 |
PublicationDateYYYYMMDD | 2025-01-09 |
PublicationDate_xml | – month: 01 year: 2025 text: 2025-01-09 day: 09 |
PublicationDecade | 2020 |
PublicationPlace | Switzerland |
PublicationPlace_xml | – name: Switzerland |
PublicationTitle | Frontiers in artificial intelligence |
PublicationTitleAlternate | Front Artif Intell |
PublicationYear | 2025 |
Publisher | Frontiers Media S.A |
Publisher_xml | – name: Frontiers Media S.A |
References | Sánchez-Zas (ref25) 2023; 141 Välja (ref28) 2020; 3 Graf (ref8) 2016 Kim (ref13) 2023; 13 Alosaimi (ref1) 2023; 13 Avdeenko (ref4) 2018; 51 (ref18) 2017 Alyami (ref3) 2022; 122 Cauteruccio (ref5) 2021; 114 Riesco (ref23) 2019; 18 Friedberg (ref7) 2015; 132 Keshavarzi (ref11) 2023; 139 Munir (ref16) 2021; 9 Tan (ref27) 2021; 11 Park (ref21) 2019; 19 (ref19) 2021 Fghdhfgh (ref6) 2022; 126 Javadnejad (ref9) 2024; 18 Papadopoulos (ref20) 2024; 44 Stiawan (ref26) 2020; 8 Mehraj (ref14) 2023; 69 Alsharaiah (ref2) 2024; 8 Khaledian (ref12) 2021; 12 Nota (ref17) 2024; 15 Zoghi (ref29) 2024; 7 Jirsik (ref10) 2020 Saeed (ref24) 2023; 23 Ramzan (ref22) 2021; 9 |
References_xml | – year: 2020 ident: ref10 – volume: 122 start-page: 2585 year: 2022 ident: ref3 article-title: Implementing integrity assurance system for big data publication-title: Wirel. Pers. Commun. doi: 10.1007/s11277-021-09013-x – volume: 126 start-page: 103069 year: 2022 ident: ref6 article-title: Understanding situation awareness in SOCs, a systematic literature review publication-title: Comput. Secur. doi: 10.1016/j.cose.2022.103069 – volume: 132 start-page: 101 year: 2015 ident: ref7 article-title: Cyber situational awareness through network anomaly detection: state of the art and new approaches publication-title: Elektr. Inf. doi: 10.1007/s00502-015-0287-4 – volume: 9 start-page: 157106 year: 2021 ident: ref22 article-title: Construction of S-boxes using different maps over elliptic curves for image encryption publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3128177 – volume: 12 start-page: 2378 year: 2021 ident: ref12 article-title: Real-time synchrophasor data anomaly detection and classification using isolation forest, kmeans, and loop publication-title: IEEE Trans. Smart Grid doi: 10.1109/TSG.2020.3046602 – volume: 8 start-page: 132911 year: 2020 ident: ref26 article-title: CICIDS-2017 dataset feature analysis with information gain for anomaly detection publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3009843 – volume: 8 start-page: 709 year: 2024 ident: ref2 article-title: An innovative network intrusion detection system (NIDS): hierarchical deep learning model based on Unsw-Nb15 dataset publication-title: Int. J. Data Netw. Sci. doi: 10.5267/j.ijdns.2024.1.007 – volume: 141 start-page: 462 year: 2023 ident: ref25 article-title: Ontology-based approach to real-time risk management and cyber-situational awareness publication-title: Futur. Gener. Comput. Syst. doi: 10.1016/j.future.2022.12.006 – volume: 139 start-page: 107520 year: 2023 ident: ref11 article-title: An ontology-driven framework for knowledge representation of digital extortion attacks publication-title: Comput. Hum. Behav. doi: 10.1016/j.chb.2022.107520 – volume: 15 start-page: 2227 year: 2024 ident: ref17 article-title: Heritage buildings management: the role of situational awareness and cyber-physical systems publication-title: J. Ambient. Intell. Humaniz. Comput. doi: 10.1007/s12652-023-04750-2 – volume: 19 start-page: 2148 year: 2019 ident: ref21 article-title: Security risk measurement for information leakage in IoT-based smart homes from a situational awareness perspective publication-title: Sensors doi: 10.3390/s19092148 – volume: 51 start-page: 1218 year: 2018 ident: ref4 article-title: Knowledge representation model based on case-based reasoning and the domain ontology: application to the IT consultation publication-title: IFAC PapersOnLine doi: 10.1016/j.ifacol.2018.08.424 – volume: 9 start-page: 105678 year: 2021 ident: ref16 article-title: Cryptanalysis of internet of health things encryption scheme based on chaotic maps publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3099004 – volume: 13 start-page: 5427 year: 2023 ident: ref1 article-title: An intrusion detection system using BoT-IoT publication-title: Appl. Sci. doi: 10.3390/app13095427 – volume: 7 start-page: e331 year: 2024 ident: ref29 article-title: UNSW-NB15 computer security dataset: analysis through visualization publication-title: Secur. Priv. doi: 10.1002/spy2.331 – volume: 3 start-page: 1 year: 2020 ident: ref28 article-title: Automating threat modeling using an ontology framework publication-title: Cybersecurity doi: 10.1186/s42400-020-00060-8 – volume: 44 start-page: 100657 year: 2024 ident: ref20 article-title: Protection of critical infrastructures from advanced combined cyber and physical threats: the PRAETORIAN approach publication-title: Int. J. Crit. Infrastruct. Prot. doi: 10.1016/j.ijcip.2023.100657 – volume: 18 start-page: 715 year: 2019 ident: ref23 article-title: Leveraging cyber threat intelligence for a dynamic risk framework: automation by using a semantic reasoner and a new combination of standards (STIX™, SWRL and OWL) publication-title: Int. J. Inf. Secur. doi: 10.1007/s10207-019-00433-2 – year: 2016 ident: ref8 – year: 2021 ident: ref19 – volume: 23 start-page: 7273 year: 2023 ident: ref24 article-title: A systematic literature review on cyber threat intelligence for organizational cybersecurity resilience publication-title: Sensors doi: 10.3390/s23167273 – volume: 114 start-page: 322 year: 2021 ident: ref5 article-title: A framework for anomaly detection and classification in multiple IoT scenarios publication-title: Futur. Gener. Comput. Syst. doi: 10.1016/j.future.2020.08.010 – volume: 13 start-page: 2331 year: 2023 ident: ref13 article-title: Study on cyber common operational picture framework for cyber situational awareness publication-title: Appl. Sci. doi: 10.3390/app13042331 – year: 2017 ident: ref18 – volume: 18 start-page: 952 year: 2024 ident: ref9 article-title: An exploratory data analysis of malware/ransomware cyberattacks: insights from an extensive cyber loss dataset publication-title: Enterp. Inf. Syst. doi: 10.1080/17517575.2024.2369952 – volume: 69 start-page: 128 year: 2023 ident: ref14 article-title: RBWCI: robust and blind watermarking framework for cultural images publication-title: IEEE Trans. Consum. Electron. doi: 10.1109/TCE.2022.3217974 – volume: 11 start-page: 69 year: 2021 ident: ref27 article-title: Secure and resilient artificial intelligence of things: a HoneyNet approach for threat detection and situational awareness publication-title: IEEE Consum. Electr. Magazine doi: 10.1109/MCE.2021.3081874 |
SSID | ssj0002505112 |
Score | 2.2795558 |
Snippet | Cyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive methodology that... IntroductionCyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive... |
SourceID | doaj pubmedcentral proquest pubmed crossref |
SourceType | Open Website Open Access Repository Aggregation Database Index Database |
StartPage | 1394363 |
SubjectTerms | anomaly detection Artificial Intelligence auto encoder cyber situational awareness isolation forest algorithm structured threat information expression |
Title | Protecting digital assets using an ontology based cyber situational awareness system |
URI | https://www.ncbi.nlm.nih.gov/pubmed/39850849 https://www.proquest.com/docview/3159440594 https://pubmed.ncbi.nlm.nih.gov/PMC11755673 https://doaj.org/article/bdcf8495862f4fea9c16b847edafcb93 |
Volume | 7 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1La9wwEB5Keumlj6QPt01QoKeCG689lq1jmiaEkJRCE8hNSCMp3YsTsl5K_31nbG_YLYVeevHBNrb8jTXzjR7fAHyo0esq1CaPhE2OpvS5hIU8Fs43KRTJOEkUL77q0ys8u66v10p9yZqwUR54BO7AB0ots3hm3glTdIZm2rNLjcEl8mbQ-eSYt5ZMiQ-WwM5MYpzG5CzMHKR7N-d0sMRPzHmw0tVGIBr0-v9GMv9cK7kWfE6ew9OJNarDsbUv4FHstuHZqiKDmjroDlx-G2UXOB6pML-RgiCK2XHsF0oWuN8o1ykRLJChdCUBLCj65fkJi3m_nIYFlfspG8TYA6pR5vklXJ0cXx6d5lPdhJxw1vZ5SU5ztzSBkBALl2oXGXbydeGbQJ6C06F0aFKUPc1FqkvNCXaIpJFdX6hewVZ328U3oNKMTHQVMu8hdMmbpiiJky7SsWnRzzL4uALR3o3yGJbTCkHcCuJWELcT4hl8FpgfbhRl6-EE29tO9rb_sncG-ysjWe4JMr3huni7XNiKmRl_Lh8yeD0a7eFVlWmZiaLJoN0w50ZbNq908x-D2rZomda6qd7-j9a_gyelFBCWMRzzHrb6-2XcZVbT-z14fPjl4vz73vAj_wbMh_yx |
linkProvider | Directory of Open Access Journals |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Protecting+digital+assets+using+an+ontology+based+cyber+situational+awareness+system&rft.jtitle=Frontiers+in+artificial+intelligence&rft.au=Almoabady%2C+Tariq+Ammar&rft.au=Alblawi%2C+Yasser+Mohammad&rft.au=Albalawi%2C+Ahmad+Emad&rft.au=Aborokbah%2C+Majed+M.&rft.date=2025-01-09&rft.pub=Frontiers+Media+S.A&rft.eissn=2624-8212&rft.volume=7&rft_id=info:doi/10.3389%2Ffrai.2024.1394363&rft.externalDocID=PMC11755673 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2624-8212&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2624-8212&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2624-8212&client=summon |