Specifying architecture of knowledge graph with data graph, information graph, knowledge graph and wisdom graph

Author(s):  
Yucong Duan ◽  
Lixu Shao ◽  
Gongzhu Hu ◽  
Zhangbing Zhou ◽  
Quan Zou ◽  
...  
2018 ◽  
Vol 6 (2) ◽  
pp. 10-25 ◽  
Author(s):  
Yucong Duan ◽  
Lixu Shao ◽  
Gongzhu Hu

Knowledge graphs have been widely adopted, in large part owing to their schema-less nature. It enables knowledge graphs to grow seamlessly and allows for new relationships and entities as needed. A knowledge graph is a graph constructed by representing each item, entity and user as nodes, and linking those nodes that interact with each other via edges. Knowledge graphs have abundant natural semantics and can contain various and more complete information. It is an expression mechanism close to natural language. However, we still lack a unified definition and standard expression form of knowledge graph. The authors propose to clarify the expression of knowledge graph as a whole. They clarify the architecture of knowledge graph from data, information, knowledge, and wisdom aspects respectively. The authors also propose to specify knowledge graph in a progressive manner as four basic forms including data graph, information graph, knowledge graph and wisdom graph.


2020 ◽  
Vol 2 (2) ◽  
Author(s):  
Suzanna Schmeelk ◽  
Lixin Tao

Many organizations, to save costs, are movinheg to t Bring Your Own Mobile Device (BYOD) model and adopting applications built by third-parties at an unprecedented rate.  Our research examines software assurance methodologies specifically focusing on security analysis coverage of the program analysis for mobile malware detection, mitigation, and prevention.  This research focuses on secure software development of Android applications by developing knowledge graphs for threats reported by the Open Web Application Security Project (OWASP).  OWASP maintains lists of the top ten security threats to web and mobile applications.  We develop knowledge graphs based on the two most recent top ten threat years and show how the knowledge graph relationships can be discovered in mobile application source code.  We analyze 200+ healthcare applications from GitHub to gain an understanding of their software assurance of their developed software for one of the OWASP top ten moble threats, the threat of “Insecure Data Storage.”  We find that many of the applications are storing personally identifying information (PII) in potentially vulnerable places leaving users exposed to higher risks for the loss of their sensitive data.


2019 ◽  
Author(s):  
Jemmy Wiratama
Keyword(s):  

I'm an Science & Technology enthusiast. I still learn how to build a knowledge graph and how to write a paper.


Sign in / Sign up

Export Citation Format

Share Document