Common Vulnerabilities and Exposures from Emails
Serdica Journal of Computing, Tome 14 (2020) no. 1-2, pp. 51-63
Ontologies are used for knowledge management, concept definition and semantic search. Ontology is applicable to the organization and management of knowledge in a single given domain. This paper is an attempt to construct a knowledge base for email vulnerabilities using ontologies. It presents a method of building relations among CVEs email entries as established by the MITRE Corporation’s weaknesses data base. The use of ontology is illustrated with queries analyzing software products from a security manager's point of view. This work is based on the MITRE community effort CWE List, Version 3.1—Research concept view CWE-1000.
Keywords:
Mail Weaknesses, Ontology Concepts, Ontology Principles, Weaknesses, Weakness Concepts
@article{SJC_2020_14_1-2_a4,
author = {Hasan, Falak Ussien},
title = {Common {Vulnerabilities} and {Exposures} from {Emails}},
journal = {Serdica Journal of Computing},
pages = {51--63},
year = {2020},
volume = {14},
number = {1-2},
language = {en},
url = {http://geodesic.mathdoc.fr/item/SJC_2020_14_1-2_a4/}
}
Hasan, Falak Ussien. Common Vulnerabilities and Exposures from Emails. Serdica Journal of Computing, Tome 14 (2020) no. 1-2, pp. 51-63. http://geodesic.mathdoc.fr/item/SJC_2020_14_1-2_a4/