Knowledge Engineering


Web Application Security: Threats, Countermeasures, and Pitfalls

IEEE Computer

Penetration testing is a crucial defense against common web application security threats such as SQL injection and cross-site scripting attacks. A proposed web vulnerability scanner automatically generates test data with combinative evasion techniques, significantly expanding test coverage and revealing more vulnerabilities.



DeepDive

Communications of the ACM

The dark data extraction or knowledge base construction (KBC) problem is to populate a relational database with information from unstructured data sources, such as emails, webpages, and PDFs. We describe DeepDive, a system that combines database and machine learning ideas to help to develop KBC systems. DeepDive leverages the effectiveness and efficiency of statistical inference and machine learning for difficult extraction tasks, whereas not requiring users to directly write any probabilistic inference algorithms. The goal of knowledge base construction (KBC) is to populate a structured relational database from unstructured input sources, such as text documents, PDFs, and diagrams.


Machine Learning and Data Mining for Computer Security: Methods and Applications (Advanced Information and Knowledge Processing): Marcus A. Maloof: 9781846280290: Amazon.com: Books

@machinelearnbot

The current area of Intrusion Detection is begging for Machine Learning to be applied to it. After reading Machine Learning and Data Mining for Computer Security, I feel Dr Maloof has hit the target dead centre. While much research has been done across Computer Security independently and Machine Learning independently, for some reason no one wanted to cross-breed the two topics. This book is a must read for anyone interested in how research can improve computer security It also provides insight into additional areas of research that can be pursued.



An Experiment in Direct Knowledge Acquisition

AITopics Original Links

LQMS is a knowledge-based system that identifies and explains anomalies in data acquired from multiple sensors. The knowledge base was built by a sequence of domain experts. Its prototype performed with a high level of accuracy and that performance has been incrementally and significantly improved during development and field testing. Several points are developed in this paper.


Reid G. Smith

AITopics Original Links

Report on the 1984 Distributed Artificial Intelligence Workshop. Reprinted in Readings in Artificial Intelligence and Databases, J. Mylopoulos and M. L. Brodie, editors, Morgan Kaufmann Publishers, Inc., 1988. Report on the 1984 Distributed Artificial Intelligence Workshop.


knowledge-based system for assessing exposure to hazardous materials

AITopics Original Links

The Knowledge-based approach allowed the system to be implemented as three separate modules: inference engine, knowledge base, and user interface. Initially required to run under MS-DOS on a PC AT equivalent with 640K of RAM, a second release to run under Windows 3.1 reused the inference engine and knowledge base, requiring only a revised user interface. Enhancements made to the inference engine and the knowledge base were immediately available to both environments.


Artificial Intelligence in Knowledge Management

AITopics Original Links

Published by The AAAI Press, Menlo Park, California. This technical report is also available in book and CD format. Please Note: Abstracts are linked to individual titles, and will appear in a separate browser window. Full-text versions of the papers are linked to the abstract text.