Validating Security Requirement Specifications through the use of a Knowledge Graph.
Lynn Vonder HaarSarah A. ReynoldsTyler ProckoOmar OchoaPublished in: ICSC (2023)
Keyphrases
- domain knowledge
- graph theory
- functional requirements
- data mining techniques
- statistical databases
- prior knowledge
- knowledge acquisition
- domain experts
- knowledge sharing
- graph theoretic
- network security
- directed graph
- data mining
- high level
- knowledge base
- information security
- learning systems
- random walk
- graph structure
- graph model
- expert systems
- graph representation