A semantic-based knowledge fusion model for solution-oriented information network development: a case study in intrusion detection field

被引:0
作者
Yu Zhang
Morteza Saberi
Elizabeth Chang
机构
[1] UNSW at ADFA,School of Business
来源
Scientometrics | 2018年 / 117卷
关键词
Knowledge fusion; Information network; Natural language processing; Crowdsourcing;
D O I
暂无
中图分类号
学科分类号
摘要
Building information networks using semantic based techniques to avoid tedious work and to achieve high efficiency has been a long-term goal in the information management world. A great volume of research has focused on developing large scale information networks for general domains to pursue the comprehensiveness and integrity of the information. However, constructing customised information networks containing subject-specific knowledge has been neglected. Such research can potentially return high value in terms of both theoretical and practical contribution. In this paper, a new type of network, solution-oriented information network, is coined that includes research problems and proposed techniques as nodes, and the relationship between them. A lightweight Semantic-based Knowledge Fusion Model (SKFM) is proposed leveraging the power of Natural Language Processing (NLP) and Crowdsourcing to construct the proposed information networks using academic papers (knowledge) from Scopus. SKFM relies on NLP in terms of automatic components while Crowdsourcing is initiated when uncertain cases arise. Applying the NLP technique assists to develop a semi-automatic knowledge fusion method for saving effort and time in extracting information from academic papers. Leveraging human power in uncertain cases is to make sure the essential concepts for developing the information networks are extracted reliably and connected correctly. SKFM shows a theoretical contribution in terms of lightweight knowledge extraction and reconstruction framework, as well as practical value by providing solutions proposed in academic papers to address corresponding research issues in subject-specific areas. Experiments have been implemented which have shown promising results. In the research field of intrusion detection, the information of attack types and proposed solutions has been extracted and integrated in a graphic manner with high accuracy and efficiency.
引用
收藏
页码:857 / 886
页数:29
相关论文
共 96 条
[1]  
Aghaei Chadegani A(2013)A comparison between two main academic literature collections Asian Social Science 9 18-26
[2]  
Salehi H(2003)Ethics and dementia: mapping the literature by bibliometric analysis International Journal of Geriatric Psychiatry 18 41-54
[3]  
Yunus M(2012)Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection IEEE Transactions on Network and Service Management 9 169-183
[4]  
Farhadi H(2007)An agent based and biological inspired real-time intrusion detection and security model for computer network operations Computer Communications 30 2649-2660
[5]  
Fooladi M(1991)Co-word analysis as a tool for describing the network of interactions between basic and technological research: The case of polymer chemsitry Scientometrics 22 155-205
[6]  
Farhadi M(2004)Bibliometric analysis of severe acute respiratory syndrome-related research in the beginning stage Scientometrics 61 69-77
[7]  
Ale Ebrahim N(2007)Health promotion research literature in Europe 1995–2005 European Journal of Public Health 17 24-28
[8]  
Baldwin C(2000)Learning to construct knowledge bases from the world wide web Artificial Intelligence 118 69-113
[9]  
Hughes J(2001)Bibliometric cartography of information retrieval research by using co-word analysis Information Processing & Management 37 817-842
[10]  
Hope T(2010)Knowledge accumulation through automatic merging of ontologies Expert Systems with Applications 37 1991-2005