Protecting digital assets using an ontology based cyber situational awareness system

Cyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive methodology that integrates the Isolation Forest and autoencoder algorithms, Structured Threat Information Expression (STIX) implementation, and ontology dev...

Full description

Saved in:
Bibliographic Details
Published inFrontiers in artificial intelligence Vol. 7; p. 1394363
Main Authors Almoabady, Tariq Ammar, Alblawi, Yasser Mohammad, Albalawi, Ahmad Emad, Aborokbah, Majed M., Manimurugan, S., Aljuhani, Ahmed, Aldawood, Hussain, Karthikeyan, P.
Format Journal Article
LanguageEnglish
Published Switzerland Frontiers Media S.A 09.01.2025
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Cyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive methodology that integrates the Isolation Forest and autoencoder algorithms, Structured Threat Information Expression (STIX) implementation, and ontology development to enhance cybersecurity threat detection and intelligence. The Isolation Forest algorithm excels in anomaly detection in high-dimensional datasets, while autoencoders provide nonlinear detection capabilities and adaptive feature learning. Together, they form a robust framework for proactive anomaly detection. The proposed methodology leverages the Isolation Forest for efficient anomaly identification and autoencoders for feature learning and nonlinear anomaly detection. Threat information was standardized using the STIX framework, facilitating structured and dynamic assessment of threat intelligence. Ontology development was employed to represent knowledge systematically and enable semantic correlation of threats. Feature mapping enriched datasets with contextual threat information. The proposed dual-algorithm framework demonstrated superior performance, achieving 95% accuracy, a 99% F1 score, and a 94.60% recall rate. These results outperformed the benchmarks, highlighting the model's effectiveness in proactive anomaly detection and cyber situational awareness enhancement. The integration of STIX and ontology development within the proposed methodology significantly enhanced threat information standardization and semantic analysis. The dual-algorithm approach provided improved detection capabilities compared to traditional methods, underscoring its potential for scalable and effective cybersecurity applications. Future research could explore further optimization and real-world deployments to refine and validate the approach.
AbstractList Cyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive methodology that integrates the Isolation Forest and autoencoder algorithms, Structured Threat Information Expression (STIX) implementation, and ontology development to enhance cybersecurity threat detection and intelligence. The Isolation Forest algorithm excels in anomaly detection in high-dimensional datasets, while autoencoders provide nonlinear detection capabilities and adaptive feature learning. Together, they form a robust framework for proactive anomaly detection.IntroductionCyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive methodology that integrates the Isolation Forest and autoencoder algorithms, Structured Threat Information Expression (STIX) implementation, and ontology development to enhance cybersecurity threat detection and intelligence. The Isolation Forest algorithm excels in anomaly detection in high-dimensional datasets, while autoencoders provide nonlinear detection capabilities and adaptive feature learning. Together, they form a robust framework for proactive anomaly detection.The proposed methodology leverages the Isolation Forest for efficient anomaly identification and autoencoders for feature learning and nonlinear anomaly detection. Threat information was standardized using the STIX framework, facilitating structured and dynamic assessment of threat intelligence. Ontology development was employed to represent knowledge systematically and enable semantic correlation of threats. Feature mapping enriched datasets with contextual threat information.MethodsThe proposed methodology leverages the Isolation Forest for efficient anomaly identification and autoencoders for feature learning and nonlinear anomaly detection. Threat information was standardized using the STIX framework, facilitating structured and dynamic assessment of threat intelligence. Ontology development was employed to represent knowledge systematically and enable semantic correlation of threats. Feature mapping enriched datasets with contextual threat information.The proposed dual-algorithm framework demonstrated superior performance, achieving 95% accuracy, a 99% F1 score, and a 94.60% recall rate. These results outperformed the benchmarks, highlighting the model's effectiveness in proactive anomaly detection and cyber situational awareness enhancement.ResultsThe proposed dual-algorithm framework demonstrated superior performance, achieving 95% accuracy, a 99% F1 score, and a 94.60% recall rate. These results outperformed the benchmarks, highlighting the model's effectiveness in proactive anomaly detection and cyber situational awareness enhancement.The integration of STIX and ontology development within the proposed methodology significantly enhanced threat information standardization and semantic analysis. The dual-algorithm approach provided improved detection capabilities compared to traditional methods, underscoring its potential for scalable and effective cybersecurity applications. Future research could explore further optimization and real-world deployments to refine and validate the approach.DiscussionThe integration of STIX and ontology development within the proposed methodology significantly enhanced threat information standardization and semantic analysis. The dual-algorithm approach provided improved detection capabilities compared to traditional methods, underscoring its potential for scalable and effective cybersecurity applications. Future research could explore further optimization and real-world deployments to refine and validate the approach.
IntroductionCyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive methodology that integrates the Isolation Forest and autoencoder algorithms, Structured Threat Information Expression (STIX) implementation, and ontology development to enhance cybersecurity threat detection and intelligence. The Isolation Forest algorithm excels in anomaly detection in high-dimensional datasets, while autoencoders provide nonlinear detection capabilities and adaptive feature learning. Together, they form a robust framework for proactive anomaly detection.MethodsThe proposed methodology leverages the Isolation Forest for efficient anomaly identification and autoencoders for feature learning and nonlinear anomaly detection. Threat information was standardized using the STIX framework, facilitating structured and dynamic assessment of threat intelligence. Ontology development was employed to represent knowledge systematically and enable semantic correlation of threats. Feature mapping enriched datasets with contextual threat information.ResultsThe proposed dual-algorithm framework demonstrated superior performance, achieving 95% accuracy, a 99% F1 score, and a 94.60% recall rate. These results outperformed the benchmarks, highlighting the model’s effectiveness in proactive anomaly detection and cyber situational awareness enhancement.DiscussionThe integration of STIX and ontology development within the proposed methodology significantly enhanced threat information standardization and semantic analysis. The dual-algorithm approach provided improved detection capabilities compared to traditional methods, underscoring its potential for scalable and effective cybersecurity applications. Future research could explore further optimization and real-world deployments to refine and validate the approach.
Cyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive methodology that integrates the Isolation Forest and autoencoder algorithms, Structured Threat Information Expression (STIX) implementation, and ontology development to enhance cybersecurity threat detection and intelligence. The Isolation Forest algorithm excels in anomaly detection in high-dimensional datasets, while autoencoders provide nonlinear detection capabilities and adaptive feature learning. Together, they form a robust framework for proactive anomaly detection. The proposed methodology leverages the Isolation Forest for efficient anomaly identification and autoencoders for feature learning and nonlinear anomaly detection. Threat information was standardized using the STIX framework, facilitating structured and dynamic assessment of threat intelligence. Ontology development was employed to represent knowledge systematically and enable semantic correlation of threats. Feature mapping enriched datasets with contextual threat information. The proposed dual-algorithm framework demonstrated superior performance, achieving 95% accuracy, a 99% F1 score, and a 94.60% recall rate. These results outperformed the benchmarks, highlighting the model's effectiveness in proactive anomaly detection and cyber situational awareness enhancement. The integration of STIX and ontology development within the proposed methodology significantly enhanced threat information standardization and semantic analysis. The dual-algorithm approach provided improved detection capabilities compared to traditional methods, underscoring its potential for scalable and effective cybersecurity applications. Future research could explore further optimization and real-world deployments to refine and validate the approach.
Author Almoabady, Tariq Ammar
Aborokbah, Majed M.
Karthikeyan, P.
Manimurugan, S.
Alblawi, Yasser Mohammad
Aldawood, Hussain
Aljuhani, Ahmed
Albalawi, Ahmad Emad
AuthorAffiliation 1 Faculty of Computers and Information Technology, University of Tabuk , Tabuk , Saudi Arabia
3 RV University , Bengaluru , India
2 NEOM , Tabuk , Saudi Arabia
AuthorAffiliation_xml – name: 2 NEOM , Tabuk , Saudi Arabia
– name: 3 RV University , Bengaluru , India
– name: 1 Faculty of Computers and Information Technology, University of Tabuk , Tabuk , Saudi Arabia
Author_xml – sequence: 1
  givenname: Tariq Ammar
  surname: Almoabady
  fullname: Almoabady, Tariq Ammar
– sequence: 2
  givenname: Yasser Mohammad
  surname: Alblawi
  fullname: Alblawi, Yasser Mohammad
– sequence: 3
  givenname: Ahmad Emad
  surname: Albalawi
  fullname: Albalawi, Ahmad Emad
– sequence: 4
  givenname: Majed M.
  surname: Aborokbah
  fullname: Aborokbah, Majed M.
– sequence: 5
  givenname: S.
  surname: Manimurugan
  fullname: Manimurugan, S.
– sequence: 6
  givenname: Ahmed
  surname: Aljuhani
  fullname: Aljuhani, Ahmed
– sequence: 7
  givenname: Hussain
  surname: Aldawood
  fullname: Aldawood, Hussain
– sequence: 8
  givenname: P.
  surname: Karthikeyan
  fullname: Karthikeyan, P.
BackLink https://www.ncbi.nlm.nih.gov/pubmed/39850849$$D View this record in MEDLINE/PubMed
BookMark eNpVkU1r3DAQhkVJaD6aH5BL8bGX3erTa59KCW0TCLSH9CxG0shR8EqpJDfsv6-d3YbkIomZV88wPGfkKKaIhFwyuhai6z_7DGHNKZdrJnopWvGOnPKWy1XHGT969T4hF6U8UEq5ooox_p6ciL5TtJP9Kbn7lVNFW0McGheGUGFsoBSspZnKUoTYpFjTmIZdY6Cga-zOYG5KqBPUkOLy4QkyRiylKbtScfuBHHsYC14c7nPy-_u3u6vr1e3PHzdXX29XVrKurriFtuto76y0UlLwCtA7ao2iZuOssQ5ax0H2HqVSlHrFWzTcoW0lY8yJc3Kz57oED_oxhy3knU4Q9HMh5UFDrsGOqI2zfl5YdS330iP0lrWmkxt04K3pxcz6smc9TmaLzmKsGcY30LedGO71kP5qxjZKtZuF8OlAyOnPhKXqbSgWxxEipqlowVQ_rzkfc_Tj62EvU_57mQNsH7A5lZLRv0QY1Yt-vejXi3590C_-ATS5pns
Cites_doi 10.1007/s11277-021-09013-x
10.1016/j.cose.2022.103069
10.1007/s00502-015-0287-4
10.1109/ACCESS.2021.3128177
10.1109/TSG.2020.3046602
10.1109/ACCESS.2020.3009843
10.5267/j.ijdns.2024.1.007
10.1016/j.future.2022.12.006
10.1016/j.chb.2022.107520
10.1007/s12652-023-04750-2
10.3390/s19092148
10.1016/j.ifacol.2018.08.424
10.1109/ACCESS.2021.3099004
10.3390/app13095427
10.1002/spy2.331
10.1186/s42400-020-00060-8
10.1016/j.ijcip.2023.100657
10.1007/s10207-019-00433-2
10.3390/s23167273
10.1016/j.future.2020.08.010
10.3390/app13042331
10.1080/17517575.2024.2369952
10.1109/TCE.2022.3217974
10.1109/MCE.2021.3081874
ContentType Journal Article
Copyright Copyright © 2025 Almoabady, Alblawi, Albalawi, Aborokbah, Manimurugan, Aljuhani, Aldawood and Karthikeyan.
Copyright © 2025 Almoabady, Alblawi, Albalawi, Aborokbah, Manimurugan, Aljuhani, Aldawood and Karthikeyan. 2025 Almoabady, Alblawi, Albalawi, Aborokbah, Manimurugan, Aljuhani, Aldawood and Karthikeyan
Copyright_xml – notice: Copyright © 2025 Almoabady, Alblawi, Albalawi, Aborokbah, Manimurugan, Aljuhani, Aldawood and Karthikeyan.
– notice: Copyright © 2025 Almoabady, Alblawi, Albalawi, Aborokbah, Manimurugan, Aljuhani, Aldawood and Karthikeyan. 2025 Almoabady, Alblawi, Albalawi, Aborokbah, Manimurugan, Aljuhani, Aldawood and Karthikeyan
DBID AAYXX
CITATION
NPM
7X8
5PM
DOA
DOI 10.3389/frai.2024.1394363
DatabaseName CrossRef
PubMed
MEDLINE - Academic
PubMed Central (Full Participant titles)
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
PubMed
MEDLINE - Academic
DatabaseTitleList MEDLINE - Academic

PubMed
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2624-8212
ExternalDocumentID oai_doaj_org_article_bdcf8495862f4fea9c16b847edafcb93
PMC11755673
39850849
10_3389_frai_2024_1394363
Genre Journal Article
GroupedDBID 53G
9T4
AAFWJ
AAYXX
ACXDI
ADBBV
ADMLS
AFPKN
ALMA_UNASSIGNED_HOLDINGS
BCNDV
CITATION
GROUPED_DOAJ
OK1
PGMZT
RPM
NPM
7X8
5PM
ID FETCH-LOGICAL-c418t-2ca68809dc4c440af5aefd0cb50b7dcbcda6d2a49fe45500f526eb2dec64111d3
IEDL.DBID DOA
ISSN 2624-8212
IngestDate Wed Aug 27 01:09:48 EDT 2025
Thu Aug 21 18:41:02 EDT 2025
Fri Jul 11 16:02:08 EDT 2025
Wed Feb 19 01:58:20 EST 2025
Tue Jul 01 01:29:57 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords structured threat information expression
anomaly detection
auto encoder
isolation forest algorithm
cyber situational awareness
Language English
License Copyright © 2025 Almoabady, Alblawi, Albalawi, Aborokbah, Manimurugan, Aljuhani, Aldawood and Karthikeyan.
This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c418t-2ca68809dc4c440af5aefd0cb50b7dcbcda6d2a49fe45500f526eb2dec64111d3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
Christian Diedrich, Otto von Guericke University Magdeburg, Germany
Teja Swaroop Mylavarapu, Capital One, United States
Edited by: Chathurika S. Wickramasinghe Brahmana, Capital One, United States
Reviewed by: Šarūnas Grigaliūnas, Kaunas University of Technology, Lithuania
OpenAccessLink https://doaj.org/article/bdcf8495862f4fea9c16b847edafcb93
PMID 39850849
PQID 3159440594
PQPubID 23479
ParticipantIDs doaj_primary_oai_doaj_org_article_bdcf8495862f4fea9c16b847edafcb93
pubmedcentral_primary_oai_pubmedcentral_nih_gov_11755673
proquest_miscellaneous_3159440594
pubmed_primary_39850849
crossref_primary_10_3389_frai_2024_1394363
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2025-01-09
PublicationDateYYYYMMDD 2025-01-09
PublicationDate_xml – month: 01
  year: 2025
  text: 2025-01-09
  day: 09
PublicationDecade 2020
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
PublicationTitle Frontiers in artificial intelligence
PublicationTitleAlternate Front Artif Intell
PublicationYear 2025
Publisher Frontiers Media S.A
Publisher_xml – name: Frontiers Media S.A
References Sánchez-Zas (ref25) 2023; 141
Välja (ref28) 2020; 3
Graf (ref8) 2016
Kim (ref13) 2023; 13
Alosaimi (ref1) 2023; 13
Avdeenko (ref4) 2018; 51
(ref18) 2017
Alyami (ref3) 2022; 122
Cauteruccio (ref5) 2021; 114
Riesco (ref23) 2019; 18
Friedberg (ref7) 2015; 132
Keshavarzi (ref11) 2023; 139
Munir (ref16) 2021; 9
Tan (ref27) 2021; 11
Park (ref21) 2019; 19
(ref19) 2021
Fghdhfgh (ref6) 2022; 126
Javadnejad (ref9) 2024; 18
Papadopoulos (ref20) 2024; 44
Stiawan (ref26) 2020; 8
Mehraj (ref14) 2023; 69
Alsharaiah (ref2) 2024; 8
Khaledian (ref12) 2021; 12
Nota (ref17) 2024; 15
Zoghi (ref29) 2024; 7
Jirsik (ref10) 2020
Saeed (ref24) 2023; 23
Ramzan (ref22) 2021; 9
References_xml – year: 2020
  ident: ref10
– volume: 122
  start-page: 2585
  year: 2022
  ident: ref3
  article-title: Implementing integrity assurance system for big data
  publication-title: Wirel. Pers. Commun.
  doi: 10.1007/s11277-021-09013-x
– volume: 126
  start-page: 103069
  year: 2022
  ident: ref6
  article-title: Understanding situation awareness in SOCs, a systematic literature review
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2022.103069
– volume: 132
  start-page: 101
  year: 2015
  ident: ref7
  article-title: Cyber situational awareness through network anomaly detection: state of the art and new approaches
  publication-title: Elektr. Inf.
  doi: 10.1007/s00502-015-0287-4
– volume: 9
  start-page: 157106
  year: 2021
  ident: ref22
  article-title: Construction of S-boxes using different maps over elliptic curves for image encryption
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3128177
– volume: 12
  start-page: 2378
  year: 2021
  ident: ref12
  article-title: Real-time synchrophasor data anomaly detection and classification using isolation forest, kmeans, and loop
  publication-title: IEEE Trans. Smart Grid
  doi: 10.1109/TSG.2020.3046602
– volume: 8
  start-page: 132911
  year: 2020
  ident: ref26
  article-title: CICIDS-2017 dataset feature analysis with information gain for anomaly detection
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3009843
– volume: 8
  start-page: 709
  year: 2024
  ident: ref2
  article-title: An innovative network intrusion detection system (NIDS): hierarchical deep learning model based on Unsw-Nb15 dataset
  publication-title: Int. J. Data Netw. Sci.
  doi: 10.5267/j.ijdns.2024.1.007
– volume: 141
  start-page: 462
  year: 2023
  ident: ref25
  article-title: Ontology-based approach to real-time risk management and cyber-situational awareness
  publication-title: Futur. Gener. Comput. Syst.
  doi: 10.1016/j.future.2022.12.006
– volume: 139
  start-page: 107520
  year: 2023
  ident: ref11
  article-title: An ontology-driven framework for knowledge representation of digital extortion attacks
  publication-title: Comput. Hum. Behav.
  doi: 10.1016/j.chb.2022.107520
– volume: 15
  start-page: 2227
  year: 2024
  ident: ref17
  article-title: Heritage buildings management: the role of situational awareness and cyber-physical systems
  publication-title: J. Ambient. Intell. Humaniz. Comput.
  doi: 10.1007/s12652-023-04750-2
– volume: 19
  start-page: 2148
  year: 2019
  ident: ref21
  article-title: Security risk measurement for information leakage in IoT-based smart homes from a situational awareness perspective
  publication-title: Sensors
  doi: 10.3390/s19092148
– volume: 51
  start-page: 1218
  year: 2018
  ident: ref4
  article-title: Knowledge representation model based on case-based reasoning and the domain ontology: application to the IT consultation
  publication-title: IFAC PapersOnLine
  doi: 10.1016/j.ifacol.2018.08.424
– volume: 9
  start-page: 105678
  year: 2021
  ident: ref16
  article-title: Cryptanalysis of internet of health things encryption scheme based on chaotic maps
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3099004
– volume: 13
  start-page: 5427
  year: 2023
  ident: ref1
  article-title: An intrusion detection system using BoT-IoT
  publication-title: Appl. Sci.
  doi: 10.3390/app13095427
– volume: 7
  start-page: e331
  year: 2024
  ident: ref29
  article-title: UNSW-NB15 computer security dataset: analysis through visualization
  publication-title: Secur. Priv.
  doi: 10.1002/spy2.331
– volume: 3
  start-page: 1
  year: 2020
  ident: ref28
  article-title: Automating threat modeling using an ontology framework
  publication-title: Cybersecurity
  doi: 10.1186/s42400-020-00060-8
– volume: 44
  start-page: 100657
  year: 2024
  ident: ref20
  article-title: Protection of critical infrastructures from advanced combined cyber and physical threats: the PRAETORIAN approach
  publication-title: Int. J. Crit. Infrastruct. Prot.
  doi: 10.1016/j.ijcip.2023.100657
– volume: 18
  start-page: 715
  year: 2019
  ident: ref23
  article-title: Leveraging cyber threat intelligence for a dynamic risk framework: automation by using a semantic reasoner and a new combination of standards (STIX™, SWRL and OWL)
  publication-title: Int. J. Inf. Secur.
  doi: 10.1007/s10207-019-00433-2
– year: 2016
  ident: ref8
– year: 2021
  ident: ref19
– volume: 23
  start-page: 7273
  year: 2023
  ident: ref24
  article-title: A systematic literature review on cyber threat intelligence for organizational cybersecurity resilience
  publication-title: Sensors
  doi: 10.3390/s23167273
– volume: 114
  start-page: 322
  year: 2021
  ident: ref5
  article-title: A framework for anomaly detection and classification in multiple IoT scenarios
  publication-title: Futur. Gener. Comput. Syst.
  doi: 10.1016/j.future.2020.08.010
– volume: 13
  start-page: 2331
  year: 2023
  ident: ref13
  article-title: Study on cyber common operational picture framework for cyber situational awareness
  publication-title: Appl. Sci.
  doi: 10.3390/app13042331
– year: 2017
  ident: ref18
– volume: 18
  start-page: 952
  year: 2024
  ident: ref9
  article-title: An exploratory data analysis of malware/ransomware cyberattacks: insights from an extensive cyber loss dataset
  publication-title: Enterp. Inf. Syst.
  doi: 10.1080/17517575.2024.2369952
– volume: 69
  start-page: 128
  year: 2023
  ident: ref14
  article-title: RBWCI: robust and blind watermarking framework for cultural images
  publication-title: IEEE Trans. Consum. Electron.
  doi: 10.1109/TCE.2022.3217974
– volume: 11
  start-page: 69
  year: 2021
  ident: ref27
  article-title: Secure and resilient artificial intelligence of things: a HoneyNet approach for threat detection and situational awareness
  publication-title: IEEE Consum. Electr. Magazine
  doi: 10.1109/MCE.2021.3081874
SSID ssj0002505112
Score 2.2795558
Snippet Cyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive methodology that...
IntroductionCyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive...
SourceID doaj
pubmedcentral
proquest
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
StartPage 1394363
SubjectTerms anomaly detection
Artificial Intelligence
auto encoder
cyber situational awareness
isolation forest algorithm
structured threat information expression
Title Protecting digital assets using an ontology based cyber situational awareness system
URI https://www.ncbi.nlm.nih.gov/pubmed/39850849
https://www.proquest.com/docview/3159440594
https://pubmed.ncbi.nlm.nih.gov/PMC11755673
https://doaj.org/article/bdcf8495862f4fea9c16b847edafcb93
Volume 7
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1La9wwEB5Keumlj6QPt01QoKeCG689lq1jmiaEkJRCE8hNSCMp3YsTsl5K_31nbG_YLYVeevHBNrb8jTXzjR7fAHyo0esq1CaPhE2OpvS5hIU8Fs43KRTJOEkUL77q0ys8u66v10p9yZqwUR54BO7AB0ots3hm3glTdIZm2rNLjcEl8mbQ-eSYt5ZMiQ-WwM5MYpzG5CzMHKR7N-d0sMRPzHmw0tVGIBr0-v9GMv9cK7kWfE6ew9OJNarDsbUv4FHstuHZqiKDmjroDlx-G2UXOB6pML-RgiCK2XHsF0oWuN8o1ykRLJChdCUBLCj65fkJi3m_nIYFlfspG8TYA6pR5vklXJ0cXx6d5lPdhJxw1vZ5SU5ztzSBkBALl2oXGXbydeGbQJ6C06F0aFKUPc1FqkvNCXaIpJFdX6hewVZ328U3oNKMTHQVMu8hdMmbpiiJky7SsWnRzzL4uALR3o3yGJbTCkHcCuJWELcT4hl8FpgfbhRl6-EE29tO9rb_sncG-ysjWe4JMr3huni7XNiKmRl_Lh8yeD0a7eFVlWmZiaLJoN0w50ZbNq908x-D2rZomda6qd7-j9a_gyelFBCWMRzzHrb6-2XcZVbT-z14fPjl4vz73vAj_wbMh_yx
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Protecting+digital+assets+using+an+ontology+based+cyber+situational+awareness+system&rft.jtitle=Frontiers+in+artificial+intelligence&rft.au=Almoabady%2C+Tariq+Ammar&rft.au=Alblawi%2C+Yasser+Mohammad&rft.au=Albalawi%2C+Ahmad+Emad&rft.au=Aborokbah%2C+Majed+M.&rft.date=2025-01-09&rft.pub=Frontiers+Media+S.A&rft.eissn=2624-8212&rft.volume=7&rft_id=info:doi/10.3389%2Ffrai.2024.1394363&rft.externalDocID=PMC11755673
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2624-8212&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2624-8212&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2624-8212&client=summon