{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:36:19Z","timestamp":1743122179321,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319992464"},{"type":"electronic","value":"9783319992471"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99247-1_12","type":"book-chapter","created":{"date-parts":[[2018,8,10]],"date-time":"2018-08-10T10:26:21Z","timestamp":1533896781000},"page":"132-143","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Automated Reasoning over Provenance-Aware Communication Network Knowledge in Support of Cyber-Situational Awareness"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3368-2215","authenticated-orcid":false,"given":"Leslie F.","family":"Sikos","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7125-3289","authenticated-orcid":false,"given":"Markus","family":"Stumptner","sequence":"additional","affiliation":[]},{"given":"Wolfgang","family":"Mayer","sequence":"additional","affiliation":[]},{"given":"Catherine","family":"Howard","sequence":"additional","affiliation":[]},{"given":"Shaun","family":"Voigt","sequence":"additional","affiliation":[]},{"given":"Dean","family":"Philp","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,11]]},"reference":[{"key":"12_CR1","series-title":"Advances in Information Security","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11391-3","volume-title":"Cyber Defense and Situational Awareness","year":"2014","unstructured":"Kott, A., Wang, C., Erbacher, R.F. (eds.): Cyber Defense and Situational Awareness. AIS, vol. 62. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11391-3"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-319-61152-5_6","volume-title":"Theory and Models for Cyber Situation Awareness","author":"C Zhong","year":"2017","unstructured":"Zhong, C., Yen, J., Liu, P., Erbacher, R.F., Garneau, C., Chen, B.: Studying analysts\u2019 data triage operations in cyber defense situational analysis. In: Liu, P., Jajodia, S., Wang, C. (eds.) Theory and Models for Cyber Situation Awareness. LNCS, vol. 10030, pp. 128\u2013169. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-61152-5_6"},{"key":"12_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-1049-9","volume-title":"Mastering Structured Data on the Semantic Web","author":"LF Sikos","year":"2015","unstructured":"Sikos, L.F.: Mastering Structured Data on the Semantic Web. Apress, Berkeley (2015). https:\/\/doi.org\/10.1007\/978-1-4842-1049-9"},{"issue":"1","key":"12_CR4","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.inffus.2012.02.006","volume":"14","author":"R Dapoigny","year":"2013","unstructured":"Dapoigny, R., Barlatier, P.: Formal foundations for situation awareness based on dependent type theory. Inf. Fusion 14(1), 87\u2013107 (2013). https:\/\/doi.org\/10.1016\/j.inffus.2012.02.006","journal-title":"Inf. Fusion"},{"key":"12_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54066-5","volume-title":"Description Logics in Multimedia Reasoning","author":"LF Sikos","year":"2017","unstructured":"Sikos, L.F.: Description Logics in Multimedia Reasoning. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-54066-5"},{"key":"12_CR6","doi-asserted-by":"publisher","unstructured":"Ballora, M., Giacobe, N.A., McNeese, M., Hall, D.L.: Information data fusion and computer network defense. In: Onwubiko, C., Owens, T. (eds.) Situational awareness in computer network defense, pp. 141\u2013164. IGI Global, Hershey (2012). https:\/\/doi.org\/10.4018\/978-1-4666-0104-8.ch009","DOI":"10.4018\/978-1-4666-0104-8.ch009"},{"key":"12_CR7","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-319-44257-0_2","volume-title":"Information Fusion for Cyber-Security Analytics","author":"A AlEroud","year":"2017","unstructured":"AlEroud, A., Karabatis, G.: A framework for contextual information fusion to detect cyber-attacks. In: Alsmadi, I.M., Karabatis, G., AlEroud, A. (eds.) Information Fusion for Cyber-Security Analytics. SCI, vol. 691, pp. 17\u201351. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-44257-0_2"},{"issue":"8","key":"12_CR8","doi-asserted-by":"publisher","first-page":"2005","DOI":"10.1007\/s00500-015-1899-7","volume":"21","author":"F Wang","year":"2017","unstructured":"Wang, F., Hu, L., Zhou, J., Hu, J., Zhao, K.: A semantics-based approach to multi-source heterogeneous information fusion in the Internet of things. Soft. Comput. 21(8), 2005\u20132013 (2017). https:\/\/doi.org\/10.1007\/s00500-015-1899-7","journal-title":"Soft. Comput."},{"issue":"3","key":"12_CR9","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.websem.2009.07.004","volume":"7","author":"R Dividino","year":"2009","unstructured":"Dividino, R., Sizov, S., Staab, S., Schueler, B.: Querying for provenance, trust, uncertainty and other meta knowledge in RDF. Web Semant. Sci. Serv. Agents World Wide Web 7(3), 204\u2013219 (2009). https:\/\/doi.org\/10.1016\/j.websem.2009.07.004","journal-title":"Web Semant. Sci. Serv. Agents World Wide Web"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.artint.2012.06.001","volume":"194","author":"J Hoffart","year":"2013","unstructured":"Hoffart, J., Suchanek, F.M., Berberich, K., Weikum, G.: YAGO2: a spatially and temporally enhanced knowledge base from Wikipedia. Artif. Intell. 194, 28\u201361 (2013). https:\/\/doi.org\/10.1016\/j.artint.2012.06.001","journal-title":"Artif. Intell."},{"key":"12_CR11","unstructured":"Hartig, O., Thompson, B.: Foundations of an alternative approach to reification in RDF (2014). https:\/\/arxiv.org\/abs\/1406.3399"},{"key":"12_CR12","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.websem.2011.08.006","volume":"11","author":"A Zimmermann","year":"2012","unstructured":"Zimmermann, A., Lopes, N., Polleres, A., Straccia, U.: A general framework for representing, reasoning and querying with annotated Semantic Web data. Web Semant. Sci. Serv. Agents World Wide Web 11, 72\u201395 (2012). https:\/\/doi.org\/10.1016\/j.websem.2011.08.006","journal-title":"Web Semant. Sci. Serv. Agents World Wide Web"},{"issue":"3","key":"12_CR13","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s10472-013-9396-0","volume":"70","author":"A Analyti","year":"2014","unstructured":"Analyti, A., Dam\u00e1sio, C.V., Antoniou, G., Pachoulakis, I.: Why-provenance information for RDF, rules, and negation. Ann. Math. Artif. Intell. 70(3), 221\u2013277 (2014). https:\/\/doi.org\/10.1007\/s10472-013-9396-0","journal-title":"Ann. Math. Artif. Intell."},{"issue":"3","key":"12_CR14","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1017\/s1471068407003213","volume":"8","author":"T Berners-Lee","year":"2008","unstructured":"Berners-Lee, T., Connolly, D., Kagal, L., Scharf, Y., Hendler, J.: N3Logic: a logical framework for the world wide web. Theory Pract. Log. Program. 8(3), 249\u2013269 (2008). https:\/\/doi.org\/10.1017\/s1471068407003213","journal-title":"Theory Pract. Log. Program."},{"key":"12_CR15","unstructured":"Ding, L., Finin, T., Peng, Y., Da Silva, P., McGuinness, D.: Tracking RDF graph provenance using RDF molecules. Paper presented at Fourth International Semantic Web Conference, Galway, Ireland, 6\u201310 November 2005"},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/978-3-642-13818-8_32","volume-title":"Scientific and Statistical Database Management","author":"SS Sahoo","year":"2010","unstructured":"Sahoo, S.S., Bodenreider, O., Hitzler, P., Sheth, A., Thirunarayan, K.: Provenance context entity (PaCE): scalable provenance tracking for scientific RDF data. In: Gertz, M., Lud\u00e4scher, B. (eds.) SSDBM 2010. LNCS, vol. 6187, pp. 461\u2013470. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13818-8_32"},{"key":"12_CR17","doi-asserted-by":"publisher","unstructured":"Nguyen, V., Bodenreider, O., Sheth, A.: Don\u2019t like RDF reification? In: Chung, C.W., Broder, A., Shim, K., Shim, K. (eds.) Proceedings of the 23rd International Conference on World Wide Web. ACM, New York (2014). https:\/\/doi.org\/10.1145\/2566486.2567973","DOI":"10.1145\/2566486.2567973"},{"key":"12_CR18","doi-asserted-by":"publisher","unstructured":"Carroll, J.J., Bizer, C., Hayes, P., Stickler, P.: Named graphs, provenance and trust. In: Proceedings of the 14th International Conference on World Wide Web. ACM, New York (2005). https:\/\/doi.org\/10.1145\/1060745.1060835","DOI":"10.1145\/1060745.1060835"},{"key":"12_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-642-04930-9_13","volume-title":"The Semantic Web - ISWC 2009","author":"G Flouris","year":"2009","unstructured":"Flouris, G., Fundulaki, I., Pediaditis, P., Theoharis, Y., Christophides, V.: Coloring RDF triples to capture provenance. In: Bernstein, A., et al. (eds.) ISWC 2009. LNCS, vol. 5823, pp. 196\u2013212. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04930-9_13"},{"key":"12_CR20","unstructured":"Sahoo, S.S., Sheth, A.: Provenir ontology: towards a framework for eScience provenance management. In: Microsoft eScience Workshop, Pittsburgh, PA, USA, 15\u201317 October 2009"},{"key":"12_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98842-9","volume-title":"AI in Cybersecurity","year":"2018","unstructured":"Sikos, L.F. (ed.): AI in Cybersecurity. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98842-9"},{"key":"12_CR22","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-319-19833-0_8","volume-title":"Artificial Intelligence Applications in Information and Communication Technologies","author":"A Martinez","year":"2015","unstructured":"Martinez, A., Yannuzzi, M., L\u00f3pez, J., Serral-Graci\u00e0, R., Ramirez, W.: Applying information extraction for abstracting and automating CLI-based configuration of network devices in heterogeneous environments. In: Laalaoui, Y., Bouguila, N. (eds.) Artificial Intelligence Applications in Information and Communication Technologies. SCI, vol. 607, pp. 167\u2013193. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19833-0_8"},{"key":"12_CR23","unstructured":"ETSI: ETSI industry specification group: measurement ontology for IP traffic (MOI); requirements for IP traffic measurement ontologies development (2012)"},{"key":"12_CR24","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-319-78102-0_4","volume-title":"Graph Structures for Knowledge Representation and Reasoning","author":"S Voigt","year":"2018","unstructured":"Voigt, S., Howard, C., Philp, D., Penny, C.: Representing and reasoning about logical network topologies. In: Croitoru, M., Marquis, P., Rudolph, S., Stapleton, G. (eds.) GKR 2017. LNCS (LNAI), vol. 10775, pp. 73\u201383. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78102-0_4"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Sikos, L.F., Stumptner, M., Mayer, W., Howard, C., Voigt, S., Philp, D.: Representing network knowledge using provenance-aware formalisms for cyber-situational awareness. Procedia Comput. Sci. (2018)","DOI":"10.1016\/j.procs.2018.07.206"},{"key":"12_CR26","volume-title":"Routing TCP\/IP","author":"J Doyle","year":"2017","unstructured":"Doyle, J.: Routing TCP\/IP, vol. 2, 2nd edn. Cisco Press, Indianapolis (2017)","edition":"2"},{"key":"12_CR27","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-1-4842-1410-7_16","volume-title":"OSPF: A Network Routing Protocol","author":"PR Tadimety","year":"2015","unstructured":"Tadimety, P.R.: Link state advertisements. OSPF: A Network Routing Protocol, pp. 75\u201390. Apress, Berkeley (2015). https:\/\/doi.org\/10.1007\/978-1-4842-1410-7_16"},{"issue":"2\u20133","key":"12_CR28","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.websem.2005.06.001","volume":"3","author":"HJ ter Horst","year":"2005","unstructured":"ter Horst, H.J.: Completeness, decidability and complexity of entailment for RDF Schema and a semantic extension involving the OWL vocabulary. Web Semant. Sci. Serv. Agents World Wide Web 3(2\u20133), 79\u2013115 (2005). https:\/\/doi.org\/10.1016\/j.websem.2005.06.001","journal-title":"Web Semant. Sci. Serv. Agents World Wide Web"}],"container-title":["Lecture Notes in Computer Science","Knowledge Science, Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99247-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T08:35:27Z","timestamp":1710232527000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-99247-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319992464","9783319992471"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99247-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"11 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"KSEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Knowledge Science, Engineering and Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Changchun","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ksem2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ksem2018.venue.link\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"262","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"We have 3 reviews for 235 submissions, 4 reviews for 25 submissions and 5 review for 2 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}