Conceptual Characterization of Cybersecurity Ontologies
暂无分享,去创建一个
Benny Rochwerger | José Ignacio Panach | Oscar Pastor | Beatriz Franco Martins | J. I. Panach | Lenin Serrano | José F. Reyes | Ó. Pastor | Benny Rochwerger | Lenin Serrano | José F. Reyes | B. F. Martins
[1] Cleotilde Gonzalez,et al. Ontology-based Adaptive Systems of Cyber Defense , 2015, STIDS.
[2] Mario Piattini,et al. A Systematic Review and Comparison of Security Ontologies , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[3] Keke Gai,et al. Cyber Incident Classifications Using Ontology-Based Knowledge Representation for Cybersecurity Insurance in Financial Industry , 2016, International Conference on Cyber Security and Cloud Computing.
[4] Roel Wieringa,et al. Design Science Methodology for Information Systems and Software Engineering , 2014, Springer Berlin Heidelberg.
[5] Timothy W. Finin,et al. A Target-Centric Ontology for Intrusion Detection , 2003, IJCAI 2003.
[6] Ju An Wang,et al. OVM: an ontology for vulnerability management , 2009, CSIIRW '09.
[7] Asunción Gómez-Pérez,et al. METHONTOLOGY: From Ontological Art Towards Ontological Engineering , 1997, AAAI 1997.
[8] James Zijun Wang,et al. An efficient ontology comparison tool for semantic Web applications , 2005, The 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI'05).
[9] Youki Kadobayashi,et al. Reference Ontology for Cybersecurity Operational Information , 2015, Comput. J..
[10] Vitor Monte Afonso,et al. Ontology for malware behavior: A core model proposal , 2014, 2014 IEEE 23rd International WETICE Conference.
[11] Leo Obrst,et al. Developing an Ontology of the Cyber Security Domain , 2012, STIDS.
[12] Anoop Singhal,et al. Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs , 2011 .
[13] Mary C. Parmelee. Toward an Ontology Architecture for Cyber-Security Standards , 2010, STIDS.
[14] Yan Jia,et al. A Practical Approach to Constructing a Knowledge Graph for Cybersecurity , 2018 .
[15] Luís Ferreira Pires,et al. An ontology-based approach for evaluating the domain appropriateness and comprehensibility appropriateness of modeling languages , 2005, MoDELS'05.
[16] Ron Weber,et al. On the deep structure of information systems , 1995, Inf. Syst. J..
[17] Ethan Hadar,et al. Big Data Analytics on Cyber Attack Graphs for Prioritizing Agile Security Requirements , 2019, 2019 IEEE 27th International Requirements Engineering Conference (RE).
[18] Dieter Pfoser. Indexing the Trajectories of Moving Objects , 2002 .
[19] Giancarlo Guizzardi,et al. On Ontology, ontologies, Conceptualizations, Modeling Languages, and (Meta)Models , 2007, DB&IS.
[20] Christopher D. Manning,et al. Incorporating Non-local Information into Information Extraction Systems by Gibbs Sampling , 2005, ACL.
[21] Youki Kadobayashi,et al. CYBEX: the cybersecurity information exchange framework (x.1500) , 2010, CCRV.
[22] Michael D. Iannacone,et al. Developing an Ontology for Cyber Security Knowledge Graphs , 2015, CISR.
[23] G. Guizzardi,et al. The role of foundational ontologies for conceptual modeling and domain ontology representation , 2006, 2006 7th International Baltic Conference on Databases and Information Systems.
[24] Audrey J. Dorofee,et al. An Incident Management Ontology , 2014, STIDS.
[25] Sandra Bergner,et al. Cybersecurity Ontology for Critical Infrastructures , 2017, KEOD.
[26] Ricardo de Almeida Falbo,et al. SABiO: Systematic Approach for Building Ontologies , 2014, ONTO.COM/ODISE@FOIS.
[27] Ricardo Jardim-Gonçalves,et al. An Ontology-Based Cybersecurity Framework for the Internet of Things , 2018, Sensors.
[28] Günther Pernul,et al. A Distributed Ledger Approach to Digital Twin Secure Data Sharing , 2019, DBSec.
[29] Stefano Borgo,et al. Ontological Foundations of dolce , 2010 .
[30] Youki Kadobayashi,et al. Ontological approach toward cybersecurity in cloud computing , 2010, SIN.
[31] Youki Kadobayashi,et al. Building ontology of cybersecurity operational information , 2010, CSIIRW '10.
[32] Nicola Guarino,et al. Ontologies and Knowledge Bases. Towards a Terminological Clarification , 1995 .
[33] Harold Booth,et al. Vulnerability Description Ontology (VDO): a Framework for Characterizing Vulnerabilities , 2016 .
[34] Sirko Schindler,et al. Comparison and evaluation of ontologies for units of measurement , 2018, Semantic Web.
[35] Romilla Syed,et al. Cybersecurity Vulnerability Management: An Ontology-Based Conceptual Model , 2018, AMCIS.
[36] H. Herre. General Formal Ontology (GFO): A Foundational Ontology for Conceptual Modelling , 2010 .
[37] Cyril Onwubiko,et al. CoCoa: An Ontology for Cybersecurity Operations Centre Analysis Process , 2018, 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA).
[38] Ankur Padia,et al. UCO: A Unified Cybersecurity Ontology , 2016, AAAI Workshop: Artificial Intelligence for Cyber Security.
[39] Lorrie Faith Cranor,et al. Computational ontology of network operations , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[40] Jeongsoo Lee,et al. An ontology-based Enterprise Architecture , 2010, Expert Syst. Appl..
[41] Alessandro Oltramari,et al. Towards a Human Factors Ontology for Cyber Security , 2015, STIDS.
[42] Barry Smith,et al. GOL: toward an axiomatized upper-level ontology , 2001, FOIS.
[43] Nick Cramer,et al. Automatic Keyword Extraction from Individual Documents , 2010 .
[44] Viviana Mascardi,et al. A Comparison of Upper Ontologies , 2007, WOA.
[45] Leslie F. Sikos. OWL Ontologies in Cybersecurity: Conceptual Modeling of Cyber-Knowledge , 2019 .