{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:55:50Z","timestamp":1772063750491,"version":"3.50.1"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/fuzz-ieee.2018.8491686","type":"proceedings-article","created":{"date-parts":[[2018,10,19]],"date-time":"2018-10-19T22:18:38Z","timestamp":1539987518000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["Handling Uncertainty and Vagueness in Network Knowledge Representation for Cyberthreat Intelligence"],"prefix":"10.1109","author":[{"given":"Leslie F.","family":"Sikos","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"zimmermann","year":"0","journal-title":"Integrating context of statements within description logics"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41938-1_2"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35975-0_3"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3705-7"},{"key":"ref31","first-page":"228","article-title":"Decidable G&#x00F6;del description logics without the finitely-valued model property","author":"borgwardt","year":"2014","journal-title":"Proceedings of the Fourteenth International Conference on Principles of Knowledge Representation and Reasoning"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24364-6_5"},{"key":"ref37","author":"sikos","year":"2018","journal-title":"AI in Cybersecurity"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1504\/IJMSO.2017.087702"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.10.020"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"818","DOI":"10.1007\/978-3-319-42007-3_69","article-title":"$\\pi - \\mathcal{S}\\mathcal{R}\\mathcal{O}\\mathcal{I}{\\mathcal{Q}^{(\\mathcal{D})}}$: possibilistic description logic for uncertain geographic information","volume":"9799","author":"bal-bourai","year":"2016","journal-title":"Trends in Applied Knowledge-Based Systems and Data Science Lect Notes Comput Sc"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75256-1_72"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08624-8_7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2011.5949390"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54066-5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73891-8_6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1613\/jair.813"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1007\/978-3-540-85654-2_14","article-title":"A decidable fuzzy description logic ${\\text{F}} - \\mathcal{A}\\mathcal{L}{\\mathcal{C}^{(\\mathcal{G})}}$","volume":"5181","author":"wang","year":"2008","journal-title":"Database and Expert Systems Applications Lect Notes Comput Sc"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2008.4630436"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-31182-3_37"},{"key":"ref19","article-title":"The fuzzy description logic ${\\text{f}} - \\mathcal{S}\\mathcal{H}\\mathcal{I}\\mathcal{N}$","author":"stoilos","year":"2005","journal-title":"Proc ISWC2005 Workshop on Uncertainty Reasoning for the Semantic Web"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2011.05.003"},{"key":"ref4","article-title":"UCO: a unified cybersecurity ontology","author":"syed","year":"2016","journal-title":"The Workshops of the Thirtieth AAAI Conference on Artificial Intelligence Artificial Intelligence for Cyber Security Technical Report WS-16-03"},{"key":"ref27","first-page":"57","article-title":"The even more irresistible SROIQ","author":"horrocks","year":"2006","journal-title":"Proceedings of the Tenth International Conference on Principles of Knowledge Representation and Reasoning"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-1049-9"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"704","DOI":"10.1007\/978-3-319-64861-3_66","article-title":"Spatiotemporal reasoning for complex video event recognition in content-based video retrieval","volume":"639","author":"sikos","year":"2018","journal-title":"Advances in Intelligent Systems and Computing"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/RCIS.2016.7549370"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/24751839.2018.1437696"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2007.10.017"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08624-8_5"},{"key":"ref2","article-title":"Summarizing network information for cyber-situational awareness via cyber-knowledge integration","author":"sikos","year":"2018","journal-title":"AOC 2018 Convention"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-01863-8_30"},{"key":"ref1","author":"mcmillan","year":"2013","journal-title":"Definition threat intelligence"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1613\/jair.2279"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04125-9_18"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2010.01.005"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72982-2_23"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2245340"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2014.09.001"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2017.09.005"}],"event":{"name":"2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","location":"Rio de Janeiro","start":{"date-parts":[[2018,7,8]]},"end":{"date-parts":[[2018,7,13]]}},"container-title":["2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8466242\/8491438\/08491686.pdf?arnumber=8491686","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T05:59:52Z","timestamp":1598248792000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8491686\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/fuzz-ieee.2018.8491686","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}