Pretend security policy using ontology matching system
Numerous emerging nations are mostly vulnerable to pretending guard extortions due to a monumental process in Cyberspace connectivity duties over the early decennary. Though coating of this cyber hit contract has been initiated in a few unlikely instances, a gross communication is nonexistent. Owing...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 1 |
container_start_page | |
container_title | |
container_volume | 2935 |
creator | Muzaffar Hussain, Mohammed Sharique Ahmed, A. Ahmed Madar, Shariq Suhail Ahmed, K. A. |
description | Numerous emerging nations are mostly vulnerable to pretending guard extortions due to a monumental process in Cyberspace connectivity duties over the early decennary. Though coating of this cyber hit contract has been initiated in a few unlikely instances, a gross communication is nonexistent. Owing to the replicated bingle setting not being plain close and formed, it is very problematical to put onward a Broad Cyber safeguard Insurance Theory that is gentle to comprehend and compose. In this broadside, the novelists cause that ontology twinned scheme can part in defining a perfect that defines the associations between dissimilar investors and pretence area components that are material in the contract conjugation. Ontology is a bailiwick that permits a steady, shareable lexis and province possibility and it has prestigious automated intellection abilities. Ontology twinned helps in necessarily producing novel useable information from incompatible message sources by integrating them. In our use container this picture has a straightforward use, for admonition, in care integrating and deed. This epistemology can lead to a writer amygdaliform policy. The framework is incompletely supported on aggregation in the ontology and implemented in Protégé, an ontology editor. Although this possibility has been developed for the cyber safeguard surroundings, it can easily be modified to be utilized in new countries. |
doi_str_mv | 10.1063/5.0199515 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>proquest_scita</sourceid><recordid>TN_cdi_scitation_primary_10_1063_5_0199515</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2937429674</sourcerecordid><originalsourceid>FETCH-LOGICAL-p1685-88beaf39114819c10a31f0bca5b61a0f4e71da74b985e6c8c94da7e303a3b0c43</originalsourceid><addsrcrecordid>eNotkE1Lw0AYhBdRMFYP_oOANyH1fbPfRylahYIeFLwtm-2mpiTZmN0c8u9taU_DDA8zMITcIywRBH3iS0CtOfILkiHnWEiB4pJkAJoVJaM_1-Qmxj1AqaVUGRGfo0--3-bRu2ls0pwPoW3cnE-x6Xd56FNow27OO5vc7zGJc0y-uyVXtW2jvzvrgny_vnyt3orNx_p99bwpBhSKF0pV3tZUIzKF2iFYijVUzvJKoIWaeYlbK1mlFffCKafZwXoK1NIKHKML8nDqHcbwN_mYzD5MY3-YNKWmkpVayCP1eKKia5JNTejNMDadHWeDYI6_GG7Ov9B_XblUeQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>2937429674</pqid></control><display><type>conference_proceeding</type><title>Pretend security policy using ontology matching system</title><source>AIP Journals Complete</source><creator>Muzaffar Hussain, Mohammed ; Sharique Ahmed, A. ; Ahmed Madar, Shariq ; Suhail Ahmed, K. A.</creator><contributor>Caffiyar, Mohamed Yousuff ; Bingi, Kishore ; A, Mohammed Hashim B</contributor><creatorcontrib>Muzaffar Hussain, Mohammed ; Sharique Ahmed, A. ; Ahmed Madar, Shariq ; Suhail Ahmed, K. A. ; Caffiyar, Mohamed Yousuff ; Bingi, Kishore ; A, Mohammed Hashim B</creatorcontrib><description>Numerous emerging nations are mostly vulnerable to pretending guard extortions due to a monumental process in Cyberspace connectivity duties over the early decennary. Though coating of this cyber hit contract has been initiated in a few unlikely instances, a gross communication is nonexistent. Owing to the replicated bingle setting not being plain close and formed, it is very problematical to put onward a Broad Cyber safeguard Insurance Theory that is gentle to comprehend and compose. In this broadside, the novelists cause that ontology twinned scheme can part in defining a perfect that defines the associations between dissimilar investors and pretence area components that are material in the contract conjugation. Ontology is a bailiwick that permits a steady, shareable lexis and province possibility and it has prestigious automated intellection abilities. Ontology twinned helps in necessarily producing novel useable information from incompatible message sources by integrating them. In our use container this picture has a straightforward use, for admonition, in care integrating and deed. This epistemology can lead to a writer amygdaliform policy. The framework is incompletely supported on aggregation in the ontology and implemented in Protégé, an ontology editor. Although this possibility has been developed for the cyber safeguard surroundings, it can easily be modified to be utilized in new countries.</description><identifier>ISSN: 0094-243X</identifier><identifier>EISSN: 1551-7616</identifier><identifier>DOI: 10.1063/5.0199515</identifier><identifier>CODEN: APCPCS</identifier><language>eng</language><publisher>Melville: American Institute of Physics</publisher><subject>Conjugation ; Dissimilar materials ; Epistemology ; Ontology</subject><ispartof>AIP conference proceedings, 2024, Vol.2935 (1)</ispartof><rights>Author(s)</rights><rights>2024 Author(s). Published by AIP Publishing.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://pubs.aip.org/acp/article-lookup/doi/10.1063/5.0199515$$EHTML$$P50$$Gscitation$$H</linktohtml><link.rule.ids>309,310,314,776,780,785,786,790,4498,23909,23910,25118,27901,27902,76127</link.rule.ids></links><search><contributor>Caffiyar, Mohamed Yousuff</contributor><contributor>Bingi, Kishore</contributor><contributor>A, Mohammed Hashim B</contributor><creatorcontrib>Muzaffar Hussain, Mohammed</creatorcontrib><creatorcontrib>Sharique Ahmed, A.</creatorcontrib><creatorcontrib>Ahmed Madar, Shariq</creatorcontrib><creatorcontrib>Suhail Ahmed, K. A.</creatorcontrib><title>Pretend security policy using ontology matching system</title><title>AIP conference proceedings</title><description>Numerous emerging nations are mostly vulnerable to pretending guard extortions due to a monumental process in Cyberspace connectivity duties over the early decennary. Though coating of this cyber hit contract has been initiated in a few unlikely instances, a gross communication is nonexistent. Owing to the replicated bingle setting not being plain close and formed, it is very problematical to put onward a Broad Cyber safeguard Insurance Theory that is gentle to comprehend and compose. In this broadside, the novelists cause that ontology twinned scheme can part in defining a perfect that defines the associations between dissimilar investors and pretence area components that are material in the contract conjugation. Ontology is a bailiwick that permits a steady, shareable lexis and province possibility and it has prestigious automated intellection abilities. Ontology twinned helps in necessarily producing novel useable information from incompatible message sources by integrating them. In our use container this picture has a straightforward use, for admonition, in care integrating and deed. This epistemology can lead to a writer amygdaliform policy. The framework is incompletely supported on aggregation in the ontology and implemented in Protégé, an ontology editor. Although this possibility has been developed for the cyber safeguard surroundings, it can easily be modified to be utilized in new countries.</description><subject>Conjugation</subject><subject>Dissimilar materials</subject><subject>Epistemology</subject><subject>Ontology</subject><issn>0094-243X</issn><issn>1551-7616</issn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2024</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNotkE1Lw0AYhBdRMFYP_oOANyH1fbPfRylahYIeFLwtm-2mpiTZmN0c8u9taU_DDA8zMITcIywRBH3iS0CtOfILkiHnWEiB4pJkAJoVJaM_1-Qmxj1AqaVUGRGfo0--3-bRu2ls0pwPoW3cnE-x6Xd56FNow27OO5vc7zGJc0y-uyVXtW2jvzvrgny_vnyt3orNx_p99bwpBhSKF0pV3tZUIzKF2iFYijVUzvJKoIWaeYlbK1mlFffCKafZwXoK1NIKHKML8nDqHcbwN_mYzD5MY3-YNKWmkpVayCP1eKKia5JNTejNMDadHWeDYI6_GG7Ov9B_XblUeQ</recordid><startdate>20240305</startdate><enddate>20240305</enddate><creator>Muzaffar Hussain, Mohammed</creator><creator>Sharique Ahmed, A.</creator><creator>Ahmed Madar, Shariq</creator><creator>Suhail Ahmed, K. A.</creator><general>American Institute of Physics</general><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20240305</creationdate><title>Pretend security policy using ontology matching system</title><author>Muzaffar Hussain, Mohammed ; Sharique Ahmed, A. ; Ahmed Madar, Shariq ; Suhail Ahmed, K. A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p1685-88beaf39114819c10a31f0bca5b61a0f4e71da74b985e6c8c94da7e303a3b0c43</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Conjugation</topic><topic>Dissimilar materials</topic><topic>Epistemology</topic><topic>Ontology</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Muzaffar Hussain, Mohammed</creatorcontrib><creatorcontrib>Sharique Ahmed, A.</creatorcontrib><creatorcontrib>Ahmed Madar, Shariq</creatorcontrib><creatorcontrib>Suhail Ahmed, K. A.</creatorcontrib><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Muzaffar Hussain, Mohammed</au><au>Sharique Ahmed, A.</au><au>Ahmed Madar, Shariq</au><au>Suhail Ahmed, K. A.</au><au>Caffiyar, Mohamed Yousuff</au><au>Bingi, Kishore</au><au>A, Mohammed Hashim B</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Pretend security policy using ontology matching system</atitle><btitle>AIP conference proceedings</btitle><date>2024-03-05</date><risdate>2024</risdate><volume>2935</volume><issue>1</issue><issn>0094-243X</issn><eissn>1551-7616</eissn><coden>APCPCS</coden><abstract>Numerous emerging nations are mostly vulnerable to pretending guard extortions due to a monumental process in Cyberspace connectivity duties over the early decennary. Though coating of this cyber hit contract has been initiated in a few unlikely instances, a gross communication is nonexistent. Owing to the replicated bingle setting not being plain close and formed, it is very problematical to put onward a Broad Cyber safeguard Insurance Theory that is gentle to comprehend and compose. In this broadside, the novelists cause that ontology twinned scheme can part in defining a perfect that defines the associations between dissimilar investors and pretence area components that are material in the contract conjugation. Ontology is a bailiwick that permits a steady, shareable lexis and province possibility and it has prestigious automated intellection abilities. Ontology twinned helps in necessarily producing novel useable information from incompatible message sources by integrating them. In our use container this picture has a straightforward use, for admonition, in care integrating and deed. This epistemology can lead to a writer amygdaliform policy. The framework is incompletely supported on aggregation in the ontology and implemented in Protégé, an ontology editor. Although this possibility has been developed for the cyber safeguard surroundings, it can easily be modified to be utilized in new countries.</abstract><cop>Melville</cop><pub>American Institute of Physics</pub><doi>10.1063/5.0199515</doi><tpages>11</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0094-243X |
ispartof | AIP conference proceedings, 2024, Vol.2935 (1) |
issn | 0094-243X 1551-7616 |
language | eng |
recordid | cdi_scitation_primary_10_1063_5_0199515 |
source | AIP Journals Complete |
subjects | Conjugation Dissimilar materials Epistemology Ontology |
title | Pretend security policy using ontology matching system |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T23%3A24%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_scita&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Pretend%20security%20policy%20using%20ontology%20matching%20system&rft.btitle=AIP%20conference%20proceedings&rft.au=Muzaffar%20Hussain,%20Mohammed&rft.date=2024-03-05&rft.volume=2935&rft.issue=1&rft.issn=0094-243X&rft.eissn=1551-7616&rft.coden=APCPCS&rft_id=info:doi/10.1063/5.0199515&rft_dat=%3Cproquest_scita%3E2937429674%3C/proquest_scita%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2937429674&rft_id=info:pmid/&rfr_iscdi=true |