Conference paper Open Access

Services Computing for Cyber-Threat Intelligence: The ANITA Approach

Daniel De Pascale; Giuseppe Cascavilla; Damian Andrew Tamburri; Willem-Jan van den Heuvel


DCAT Export

<?xml version='1.0' encoding='utf-8'?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:adms="http://www.w3.org/ns/adms#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dct="http://purl.org/dc/terms/" xmlns:dctype="http://purl.org/dc/dcmitype/" xmlns:dcat="http://www.w3.org/ns/dcat#" xmlns:duv="http://www.w3.org/ns/duv#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:frapo="http://purl.org/cerif/frapo/" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:gsp="http://www.opengis.net/ont/geosparql#" xmlns:locn="http://www.w3.org/ns/locn#" xmlns:org="http://www.w3.org/ns/org#" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:prov="http://www.w3.org/ns/prov#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:vcard="http://www.w3.org/2006/vcard/ns#" xmlns:wdrs="http://www.w3.org/2007/05/powder-s#">
  <rdf:Description rdf:about="https://doi.org/10.5281/zenodo.4534163">
    <rdf:type rdf:resource="http://www.w3.org/ns/dcat#Dataset"/>
    <dct:type rdf:resource="http://purl.org/dc/dcmitype/Text"/>
    <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://doi.org/10.5281/zenodo.4534163</dct:identifier>
    <foaf:page rdf:resource="https://doi.org/10.5281/zenodo.4534163"/>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Daniel De Pascale</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>tilburg university</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Giuseppe Cascavilla</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Tu/e - JADS</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Damian Andrew Tamburri</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Tu/e - JADS</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Willem-Jan van den Heuvel</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>tilburg university</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:title>Services Computing for Cyber-Threat Intelligence: The ANITA Approach</dct:title>
    <dct:publisher>
      <foaf:Agent>
        <foaf:name>Zenodo</foaf:name>
      </foaf:Agent>
    </dct:publisher>
    <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#gYear">2020</dct:issued>
    <frapo:isFundedBy rdf:resource="info:eu-repo/grantAgreement/EC/H2020/787061/"/>
    <schema:funder>
      <foaf:Organization>
        <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#string">10.13039/501100000780</dct:identifier>
        <foaf:name>European Commission</foaf:name>
      </foaf:Organization>
    </schema:funder>
    <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2020-02-17</dct:issued>
    <owl:sameAs rdf:resource="https://zenodo.org/record/4534163"/>
    <adms:identifier>
      <adms:Identifier>
        <skos:notation rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://zenodo.org/record/4534163</skos:notation>
        <adms:schemeAgency>url</adms:schemeAgency>
      </adms:Identifier>
    </adms:identifier>
    <dct:isVersionOf rdf:resource="https://doi.org/10.5281/zenodo.4534162"/>
    <dct:isPartOf rdf:resource="https://zenodo.org/communities/787061"/>
    <dct:description>&lt;p&gt;Major cybersecurity and threat intelligence analysts agree that online criminal activity is increasing exponentially. Technologies, newspapers, the internet, and social media made the dark web an accessible place to almost everyone. The ease of accessing the dark side of the web makes the problem more critical than ever. For this reason, the European Union financed the ANITA project, consisting of different tools for monitoring and fighting illegal criminal activities on the Dark Web. In the ANITA project, we propose different Big Data analytic tools for the analysis of all data extracted from illegal marketplaces. In this survey paper we present our developed tools for detecting trends and analyzing the incoming information with respect to illegal trafficking. The tool extracts information about specific trends, analytics and produces actionable insight on buying and transaction habits and user behaviors. The tool extracts statistics in order to support and guide investigators and law enforcement agencies for the detection of criminal activities.&amp;nbsp;&lt;/p&gt;</dct:description>
    <dct:description>not available online yet. Here the list of papers accepted https://esocc-conf.eu/index.php/accepted-papers/ grant "PRoTECT" under grant Nno. 815356.</dct:description>
    <dct:accessRights rdf:resource="http://publications.europa.eu/resource/authority/access-right/PUBLIC"/>
    <dct:accessRights>
      <dct:RightsStatement rdf:about="info:eu-repo/semantics/openAccess">
        <rdfs:label>Open Access</rdfs:label>
      </dct:RightsStatement>
    </dct:accessRights>
    <dcat:distribution>
      <dcat:Distribution>
        <dct:license rdf:resource="https://creativecommons.org/licenses/by/4.0/legalcode"/>
        <dcat:accessURL rdf:resource="https://doi.org/10.5281/zenodo.4534163"/>
      </dcat:Distribution>
    </dcat:distribution>
    <dcat:distribution>
      <dcat:Distribution>
        <dcat:accessURL>https://doi.org/10.5281/zenodo.4534163</dcat:accessURL>
        <dcat:byteSize>341161</dcat:byteSize>
        <dcat:downloadURL>https://zenodo.org/record/4534163/files/Springer_Lecture_Notes_in_Computer_Science.pdf</dcat:downloadURL>
        <dcat:mediaType>application/pdf</dcat:mediaType>
      </dcat:Distribution>
    </dcat:distribution>
  </rdf:Description>
  <foaf:Project rdf:about="info:eu-repo/grantAgreement/EC/H2020/787061/">
    <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#string">787061</dct:identifier>
    <dct:title>Advanced tools for fighting oNline Illegal TrAfficking</dct:title>
    <frapo:isAwardedBy>
      <foaf:Organization>
        <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#string">10.13039/501100000780</dct:identifier>
        <foaf:name>European Commission</foaf:name>
      </foaf:Organization>
    </frapo:isAwardedBy>
  </foaf:Project>
</rdf:RDF>
41
25
views
downloads
All versions This version
Views 4141
Downloads 2525
Data volume 8.5 MB8.5 MB
Unique views 3131
Unique downloads 2323

Share

Cite as