Automated Query Graph Generation for Querying Knowledge Graphs

2021 ◽  
Author(s):  
Weiguo Zheng ◽  
Mei Zhang
Author(s):  
Anastasia Dimou

In this chapter, an overview of the state of the art on knowledge graph generation is provided, with focus on the two prevalent mapping languages: the W3C recommended R2RML and its generalisation RML. We look into details on their differences and explain how knowledge graphs, in the form of RDF graphs, can be generated with each one of the two mapping languages. Then we assess if the vocabulary terms were properly applied to the data and no violations occurred on their use, either using R2RML or RML to generate the desired knowledge graph.


Author(s):  
Yanli Feng ◽  
Gongliang Sun ◽  
Zhiyao Liu ◽  
Chenrui Wu ◽  
Xiaoyang Zhu ◽  
...  

2020 ◽  
Vol 2 (2) ◽  
Author(s):  
Suzanna Schmeelk ◽  
Lixin Tao

Many organizations, to save costs, are movinheg to t Bring Your Own Mobile Device (BYOD) model and adopting applications built by third-parties at an unprecedented rate.  Our research examines software assurance methodologies specifically focusing on security analysis coverage of the program analysis for mobile malware detection, mitigation, and prevention.  This research focuses on secure software development of Android applications by developing knowledge graphs for threats reported by the Open Web Application Security Project (OWASP).  OWASP maintains lists of the top ten security threats to web and mobile applications.  We develop knowledge graphs based on the two most recent top ten threat years and show how the knowledge graph relationships can be discovered in mobile application source code.  We analyze 200+ healthcare applications from GitHub to gain an understanding of their software assurance of their developed software for one of the OWASP top ten moble threats, the threat of “Insecure Data Storage.”  We find that many of the applications are storing personally identifying information (PII) in potentially vulnerable places leaving users exposed to higher risks for the loss of their sensitive data.


2020 ◽  
Vol 14 (7) ◽  
pp. 546-553
Author(s):  
Zhenxing Zheng ◽  
Zhendong Li ◽  
Gaoyun An ◽  
Songhe Feng
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document