Conceptual Characterization of Cybersecurity Ontologies

[1]  Cleotilde Gonzalez,et al.  Ontology-based Adaptive Systems of Cyber Defense , 2015, STIDS.

[2]  Mario Piattini,et al.  A Systematic Review and Comparison of Security Ontologies , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[3]  Keke Gai,et al.  Cyber Incident Classifications Using Ontology-Based Knowledge Representation for Cybersecurity Insurance in Financial Industry , 2016, International Conference on Cyber Security and Cloud Computing.

[4]  Roel Wieringa,et al.  Design Science Methodology for Information Systems and Software Engineering , 2014, Springer Berlin Heidelberg.

[5]  Timothy W. Finin,et al.  A Target-Centric Ontology for Intrusion Detection , 2003, IJCAI 2003.

[6]  Ju An Wang,et al.  OVM: an ontology for vulnerability management , 2009, CSIIRW '09.

[7]  Asunción Gómez-Pérez,et al.  METHONTOLOGY: From Ontological Art Towards Ontological Engineering , 1997, AAAI 1997.

[8]  James Zijun Wang,et al.  An efficient ontology comparison tool for semantic Web applications , 2005, The 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI'05).

[9]  Youki Kadobayashi,et al.  Reference Ontology for Cybersecurity Operational Information , 2015, Comput. J..

[10]  Vitor Monte Afonso,et al.  Ontology for malware behavior: A core model proposal , 2014, 2014 IEEE 23rd International WETICE Conference.

[11]  Leo Obrst,et al.  Developing an Ontology of the Cyber Security Domain , 2012, STIDS.

[12]  Anoop Singhal,et al.  Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs , 2011 .

[13]  Mary C. Parmelee Toward an Ontology Architecture for Cyber-Security Standards , 2010, STIDS.

[14]  Yan Jia,et al.  A Practical Approach to Constructing a Knowledge Graph for Cybersecurity , 2018 .

[15]  Luís Ferreira Pires,et al.  An ontology-based approach for evaluating the domain appropriateness and comprehensibility appropriateness of modeling languages , 2005, MoDELS'05.

[16]  Ron Weber,et al.  On the deep structure of information systems , 1995, Inf. Syst. J..

[17]  Ethan Hadar,et al.  Big Data Analytics on Cyber Attack Graphs for Prioritizing Agile Security Requirements , 2019, 2019 IEEE 27th International Requirements Engineering Conference (RE).

[18]  Dieter Pfoser Indexing the Trajectories of Moving Objects , 2002 .

[19]  Giancarlo Guizzardi,et al.  On Ontology, ontologies, Conceptualizations, Modeling Languages, and (Meta)Models , 2007, DB&IS.

[20]  Christopher D. Manning,et al.  Incorporating Non-local Information into Information Extraction Systems by Gibbs Sampling , 2005, ACL.

[21]  Youki Kadobayashi,et al.  CYBEX: the cybersecurity information exchange framework (x.1500) , 2010, CCRV.

[22]  Michael D. Iannacone,et al.  Developing an Ontology for Cyber Security Knowledge Graphs , 2015, CISR.

[23]  G. Guizzardi,et al.  The role of foundational ontologies for conceptual modeling and domain ontology representation , 2006, 2006 7th International Baltic Conference on Databases and Information Systems.

[24]  Audrey J. Dorofee,et al.  An Incident Management Ontology , 2014, STIDS.

[25]  Sandra Bergner,et al.  Cybersecurity Ontology for Critical Infrastructures , 2017, KEOD.

[26]  Ricardo de Almeida Falbo,et al.  SABiO: Systematic Approach for Building Ontologies , 2014, ONTO.COM/ODISE@FOIS.

[27]  Ricardo Jardim-Gonçalves,et al.  An Ontology-Based Cybersecurity Framework for the Internet of Things , 2018, Sensors.

[28]  Günther Pernul,et al.  A Distributed Ledger Approach to Digital Twin Secure Data Sharing , 2019, DBSec.

[29]  Stefano Borgo,et al.  Ontological Foundations of dolce , 2010 .

[30]  Youki Kadobayashi,et al.  Ontological approach toward cybersecurity in cloud computing , 2010, SIN.

[31]  Youki Kadobayashi,et al.  Building ontology of cybersecurity operational information , 2010, CSIIRW '10.

[32]  Nicola Guarino,et al.  Ontologies and Knowledge Bases. Towards a Terminological Clarification , 1995 .

[33]  Harold Booth,et al.  Vulnerability Description Ontology (VDO): a Framework for Characterizing Vulnerabilities , 2016 .

[34]  Sirko Schindler,et al.  Comparison and evaluation of ontologies for units of measurement , 2018, Semantic Web.

[35]  Romilla Syed,et al.  Cybersecurity Vulnerability Management: An Ontology-Based Conceptual Model , 2018, AMCIS.

[36]  H. Herre General Formal Ontology (GFO): A Foundational Ontology for Conceptual Modelling , 2010 .

[37]  Cyril Onwubiko,et al.  CoCoa: An Ontology for Cybersecurity Operations Centre Analysis Process , 2018, 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA).

[38]  Ankur Padia,et al.  UCO: A Unified Cybersecurity Ontology , 2016, AAAI Workshop: Artificial Intelligence for Cyber Security.

[39]  Lorrie Faith Cranor,et al.  Computational ontology of network operations , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[40]  Jeongsoo Lee,et al.  An ontology-based Enterprise Architecture , 2010, Expert Syst. Appl..

[41]  Alessandro Oltramari,et al.  Towards a Human Factors Ontology for Cyber Security , 2015, STIDS.

[42]  Barry Smith,et al.  GOL: toward an axiomatized upper-level ontology , 2001, FOIS.

[43]  Nick Cramer,et al.  Automatic Keyword Extraction from Individual Documents , 2010 .

[44]  Viviana Mascardi,et al.  A Comparison of Upper Ontologies , 2007, WOA.

[45]  Leslie F. Sikos OWL Ontologies in Cybersecurity: Conceptual Modeling of Cyber-Knowledge , 2019 .