2022-05-27
New doctoral dissertation
VILNIUS TECH Library invites you to follow the published new dissertations. The dissertation „Research on automated knowledge base generation methods of information security risk analysis expert systems“ prepared by VILNIUS TECH, Donatas Vitkus, is presented in English. The dissertation was prepared in 2017–2022, supervisors – Assoc. Prof. Dr Nikolaj GORANIN
The dissertation was defended at the public meeting of the Dissertation Defense Council of Informatics Engineering in the Senate Hall of Vilnius Gediminas Technical University at 1 p. m. on 27 May 2022.
„The dissertation consists of an introduction, five main chapters, and general conclusions. The first chapter introduces ES for information security risk assessment, discusses the existing methods of forming and updating the ES knowledge base, and identifies potential sources of information security knowledge. The second chapter presents an approach to transforming ontologies into ES knowledge base rules. The third chapter presents a method for automatically transferring information from website (WEB) sources to the ES knowledge base. The fourth chapter presents an approach to transforming attack trees into ES knowledge base rules, which allows the ES knowledge base to be expanded with the risks of cyberattacks. The proposed methods are implemented and tested by importing the developed rules into Java Expert System Shell (JESS)-based ES. The fifth chapter describes the developed ES prototype for small and medium-sized enterprises (SMEs), wh“.
Doctoral dissertation readers can search via VILNIUS TECH Virtual Library
The dissertation was defended at the public meeting of the Dissertation Defense Council of Informatics Engineering in the Senate Hall of Vilnius Gediminas Technical University at 1 p. m. on 27 May 2022.
„The dissertation consists of an introduction, five main chapters, and general conclusions. The first chapter introduces ES for information security risk assessment, discusses the existing methods of forming and updating the ES knowledge base, and identifies potential sources of information security knowledge. The second chapter presents an approach to transforming ontologies into ES knowledge base rules. The third chapter presents a method for automatically transferring information from website (WEB) sources to the ES knowledge base. The fourth chapter presents an approach to transforming attack trees into ES knowledge base rules, which allows the ES knowledge base to be expanded with the risks of cyberattacks. The proposed methods are implemented and tested by importing the developed rules into Java Expert System Shell (JESS)-based ES. The fifth chapter describes the developed ES prototype for small and medium-sized enterprises (SMEs), wh“.
Doctoral dissertation readers can search via VILNIUS TECH Virtual Library
-
- Page administrators:
- Jolanta Juršėnė
- Asta Katinaitė-Griežienė
- Olena Dubova
- Orinta Sajetienė
- Marta Širokova
- Ugnė Daraškevičiūtė