Skip to main content

A New Collaborative Knowledge Integration Scheme

  • Conference paper
  • First Online:
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 612))

  • 1759 Accesses

Abstract

As we know, knowledge acquisition is a critical bottleneck in building a knowledge based system. Many researches and tools have been developed to acquire domain knowledge in constructing the initial prototype. However, owing to the knowledge explosion, the new objects will be evolved in a dynamic environment and the existing knowledge needs to be updated with the times. It implies that the domain knowledge constructed at a time may become degraded in the future. How to efficiently update the time-related domain knowledge according to the current environment is an interesting problem, especially for the cyber-security domain. In the context of rapid changes in cyber-attacks, the traditional way to establish or maintain complete domain knowledge usually requires a lot of efforts to acquire the domain knowledge from experts. Therefore, in this paper, we propose a new knowledge integration methodology to integrate the multiple knowledge objects and ease the effort of maintaining the domain knowledge which is changing with the times and environment. To evaluate the performance of our scheme, an experiment of cyber-security card game has been made. The experimental result shows the knowledge integration scheme can improve the rules of the game.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Advanced persistent threat Wikipedia. https://en.wikipedia.org/wiki/Advanced_persistent_threat

  2. Tseng, S.S., Ku, C.H., Lee, T.J., Geng, G.G., Wang, Y.J.: Building a frame-based anti-phishing model based on phishing ontology. In: Proceedings of the AIT2013 (2013)

    Google Scholar 

  3. Lee, T.-J., et al.: Game-based Anti-Phishing Training. In: Proceedings of the TWELF (2010)

    Google Scholar 

  4. Tung, Y.-H., et al.: Building a frame-based content generation approach for APT prevention education. In: Proceedings of the International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (EEE), p. 1. The Steering Committee of the World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), January 2014

    Google Scholar 

  5. Tseng, S.-S., et al.: Building a game-based internet security learning system by ontology crystallization approach. In: Proceedings of the International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (EEE), p. 98. The Steering Committee of the World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), January 2015

    Google Scholar 

  6. Tankard, C.: Advanced persistent threats and how to monitor and deter them. Netw. Secur. 2011(8), 16–19 (2011)

    Article  Google Scholar 

  7. Qi, M., Zou, C.-Y.: A study of anti-phishing strategies based on TRIZ. In: International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2009, vol. 2, pp. 536–538. IEEE (2009)

    Google Scholar 

  8. Ginsburg, H.P., Opper, S.: Piaget’s theory of intellectual development. Prentice-Hall Inc., New Jersey (1988)

    Google Scholar 

  9. Escobar, C.R.: Understanding our cognitive processes. Int. Educ. Res. J. 3(3) (2017)

    Google Scholar 

  10. Haopu, Y.: Method for behavior-prediction of APT attack based on dynamic Bayesian game. In: 2016 IEEE International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), pp. 177–182. IEEE, July 2016

    Google Scholar 

  11. Tseng, S.S., Ku, C.H., Lu, A.C., Wang, Y.J., Geng, G.G.: Building a self-organizing phishing model based upon dynamic EMCUD. In: 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 509–512. IEEE, October 2013

    Google Scholar 

  12. Wang, J., Wei, W., Ding, L., Li, J.: Method for analyzing the knowledge collaboration effect of R&D project teams based on bloom’s taxonomy. Comput. Ind. Eng. 103, 158–167 (2017)

    Article  Google Scholar 

  13. Yu, G., Yang, Y., Qingsong, X.: An ontology-based approach for knowledge integration in product collaborative development. J. Intell. Syst. 26(1), 35–46 (2017)

    Google Scholar 

  14. Suominen, A., Mäenpää, S., Breite, R.: Expert knowledge integration—a systematic approach for multi-stakeholder innovation. In: Practices for Network Management, pp. 113–129. Springer International Publishing, Cham (2017)

    Google Scholar 

  15. Weng, J.-F.: A self-organizing behavior modeling on programming e-learning. Ph. D. Dissertation, Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan, R.O.C., December (2010)

    Google Scholar 

Download references

Acknowledgment

This work was partially supported by the National Science Council of the Republic of China under grants MOST 104-2511-S-468-005-MY2 and MOST 104-2511-S-468-002-MY2.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuh-Jye Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Tseng, SS., Wang, YJ. (2018). A New Collaborative Knowledge Integration Scheme. In: Barolli, L., Enokido, T. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2017. Advances in Intelligent Systems and Computing, vol 612. Springer, Cham. https://doi.org/10.1007/978-3-319-61542-4_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-61542-4_55

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-61541-7

  • Online ISBN: 978-3-319-61542-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics