Riunet Móvil

Home Versión de escritorio

A framework for conceptual characterization of ontologies and its application in the cybersecurity domain

Mostrar el registro sencillo del ítem

dc.contributor.author Franco Martins, Beatriz es_ES
dc.contributor.author Serrano-Gil, Lenin Javier es_ES
dc.contributor.author REYES ROMÁN, JOSÉ FABIÁN es_ES
dc.contributor.author Panach, Jose Ignacio es_ES
dc.contributor.author Pastor López, Oscar es_ES
dc.contributor.author Hadad, Moshe es_ES
dc.contributor.author Rochwerger, Benny es_ES
dc.date.accessioned 2023-07-21T18:04:06Z
dc.date.available 2023-07-21T18:04:06Z
dc.date.issued 2022-08 es_ES
dc.identifier.issn 1619-1366 es_ES
dc.identifier.uri http://hdl.handle.net/10251/195318
dc.description.abstract [EN] Organizations are actively seeking efficient solutions for the management and protection of their assets. However, Cybersecurity is a vast and complex domain, especially for large enterprises because it requires an interdisciplinary approach. Knowledge Graphs are one of the mechanisms that organizations use to explore security among assets and possible attacks. The grounding of concepts is fundamental to implementing Knowledge Graphs, and it is one of the most relevant ontology applications. Therefore, Cybersecurity Ontologies have emerged as an important research subject. The first contribution of this paper is a search for previously existing works that have defined Cybersecurity Ontologies. We found twenty-eight ontologies in this search. Based on this result, we propose a Cybersecurity Terminological Validation and a Framework for Classifying Ontologies. Then, we provide a cross-analysis of these two proposals and present a proposal of best practices for improving the ontological approach in the cybersecurity domain. We also discuss the impact of this proposal with regard to the Ontology Engineering process. Our goal is to provide a solution that meets the organization¿s needs in terms of Cybersecurity and to contribute to Ontology Engineering research. es_ES
dc.description.sponsorship This work has been developed with the financial support of the Accenture LTD (Accenture Labs, Tel Aviv, Israel) and Spanish State Research Agency under the projects "Digital Knowledge Graph - Adaptable Analytics API" and MICIN/AEI/10.13039/501100011033 and co-financed with ERDF and the European Union NextGenerationEU/PRTR. es_ES
dc.language Inglés es_ES
dc.publisher Springer-Verlag es_ES
dc.relation.ispartof Software & Systems Modeling es_ES
dc.rights Reserva de todos los derechos es_ES
dc.subject Conceptual modeling es_ES
dc.subject Ontology classification es_ES
dc.subject Cybersecurity ontology es_ES
dc.subject Ontology es_ES
dc.subject.classification LENGUAJES Y SISTEMAS INFORMATICOS es_ES
dc.title A framework for conceptual characterization of ontologies and its application in the cybersecurity domain es_ES
dc.type Artículo es_ES
dc.identifier.doi 10.1007/s10270-022-01013-0 es_ES
dc.rights.accessRights Abierto es_ES
dc.contributor.affiliation Universitat Politècnica de València. Escola Tècnica Superior d'Enginyeria Informàtica es_ES
dc.description.bibliographicCitation Franco Martins, B.; Serrano-Gil, LJ.; Reyes Román, JF.; Panach, JI.; Pastor López, O.; Hadad, M.; Rochwerger, B. (2022). A framework for conceptual characterization of ontologies and its application in the cybersecurity domain. Software & Systems Modeling. 21(4):1437-1464. https://doi.org/10.1007/s10270-022-01013-0 es_ES
dc.description.accrualMethod S es_ES
dc.relation.publisherversion https://doi.org/10.1007/s10270-022-01013-0 es_ES
dc.description.upvformatpinicio 1437 es_ES
dc.description.upvformatpfin 1464 es_ES
dc.type.version info:eu-repo/semantics/publishedVersion es_ES
dc.description.volume 21 es_ES
dc.description.issue 4 es_ES
dc.relation.pasarela S\470890 es_ES
dc.contributor.funder European Commission es_ES
dc.contributor.funder Agencia Estatal de Investigación es_ES
dc.contributor.funder European Regional Development Fund es_ES
dc.description.references Agrawal, V.: Towards the ontology of ISO/IEC 27005:2011 risk management standard. In: HAISA (2016) es_ES
dc.description.references Almeida, J.P.A., Guizzardi, G.: An ontological analysis of the notion of community in the RM-ODP enterprise language. Comput. Stand. Interfaces 35(3), 257–268 (2013) es_ES
dc.description.references Almeida, J.P.A, Guizzardi, G., Sales, T.P., Falbo, R.A.: gUFO: A Lightweight Implementation of the Unified Foundational Ontology (UFO). Technical Repot Version 1, Federal University of Espirito Santo (2019). https://nemo-ufes.github.io/gufo/ es_ES
dc.description.references Babiceanu, R.F., Seker, R.: Cybersecurity and resilience modelling for software-defined networks-based manufacturing applications. Stud. Comput. Intell. 694, 167–176 (2017). https://doi.org/10.1007/978-3-319-51100-9_15 es_ES
dc.description.references Ben-Asher, N., Oltramari, A., Erbacher, R.F., Gonzalez, C.: Ontology-based adaptive systems of cyber defense. In: STIDS, pp. 34–41 (2015) es_ES
dc.description.references Benevides, A.B., Guizzardi, G.: A model-based tool for conceptual modeling and domain ontology engineering in OntoUML. In: Enterprise Information Systems, pp. 528–538 (2009) es_ES
dc.description.references Bergner, S., Lechner, U.: Cybersecurity ontology for critical infrastructures. In: KEOD, pp. 80–85 (2017) es_ES
dc.description.references Bizer, C., Heath, T., Berners-Lee, T.: Linked data: the story so far. In: Semantic Services, Interoperability and Web Applications: Emerging Concepts, pp. 205–227. IGI Global (2011) es_ES
dc.description.references Blanco, C., Lasheras, J., Valencia-García, R., Fernández-Medina, E., Toval, A., Piattini, M.: A systematic review and comparison of security ontologies. In: 3th International Conference on Availability, Reliability and Security, pp. 813–820. IEEE (2008) es_ES
dc.description.references Booth, H., Turner, C.: Vulnerability description ontology (VDO). In: A Framework for Characterizing Vulnerabilities NIST (2016) es_ES
dc.description.references Borgo, S., Masolo, C.: Ontological Foundations of DOLCE, pp. 279–295. Springer, Dordrecht (2010) es_ES
dc.description.references Borst, W.N.: Construction of Engineering Ontologies for Knowledge Sharing and Reuse. CTIT, Centre for Telematics and Information Technology, New Delhi (1997) es_ES
dc.description.references de Almeida Falbo, R.: Sabio: systematic approach for building ontologies. In: Guizzardi, G., Pastor, O., Wand, Y., de Cesare, S., Gailly, F., Lycett, M., Partridge, C. (eds.) Proceedings of the 1st Joint Workshop ONTO.COM/ODISE on Ontologies in Conceptual Modeling and Information Systems Engineering, C EUR-WS.org, CEUR Workshop Proceedings, vol. 1301 (2014) es_ES
dc.description.references Degen, W., Heller, B., Herre, H., Smith, B.: Gol: toward an axiomatized upper-level ontology. In: Proceedings of the International Conference on Formal Ontology in Information Systems, vol. 2001, pp. 34–46 (2001) es_ES
dc.description.references Duarte, B.B., Souza VES, de Castro Leal AL, de Almeida Falbo, R., Guizzardi, G., Guizzardi, R.S.: Towards an ontology of requirements at runtime. In: FOIS, pp. 255–268 (2016) es_ES
dc.description.references Duarte, B.B., Falbo, R.A., Guizzardi, G., Guizzardi, R.S., Souza, V.E.: Towards an ontology of software defects, errors and failures. In: International Conference on Conceptual Modeling, pp. 349–362. Springer (2018) es_ES
dc.description.references Elnagdy, S.A., Qiu, M., Gai, K.: Cyber incident classifications using ontology-based knowledge representation for cybersecurity insurance in financial industry. In: 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 301–306. IEEE (2016) es_ES
dc.description.references Falbo, R., Bertollo, G.: A software process ontology as a common vocabulary about software processes. Int. J. Bus. Process. Integr. Manag. 4, 239–250 (2009) es_ES
dc.description.references Fensel, D.: Ontologies. In: Ontologies, pp. 11–18. Springer (2001) es_ES
dc.description.references Fernández-López, M., Gómez-Pérez, A., Juristo, N.: Methontology: from ontological art towards ontological engineering. In: Proceedings of the Ontological Engineering AAAI-97 Spring Symposium Series. American Association for Artificial Intelligence (1997) es_ES
dc.description.references Gailly, F., Geerts, G., Poels, G.: Ontological reengineering of the REA-EO using UFO. In: International Workshop on Ontology-Driven Software Engineering (2009) es_ES
dc.description.references Gamma, E.: Design Patterns: Elements of Reusable Object-Oriented Software. Pearson Education India, New York (1995) es_ES
dc.description.references Gasmi, H., Laval, J., Bouras, A.: Cold-start cybersecurity ontology population using information extraction with LSTM. In: 2019 International Conference on Cyber Security for Emerging Technologies (CSET), pp. 1–6 (2019). https://doi.org/10.1109/CSET.2019.8904905 es_ES
dc.description.references Giaretta, P., Guarino, N.: Ontologies and knowledge bases towards a terminological clarification. In: Towards Very Large Knowledge Bases: knowledge Building & Knowledge Sharing, vol. 25, p. 32 (1995) es_ES
dc.description.references Giunchiglia, F., Zaihrayeu, I.: Lightweight Ontologies. Technical report, University of Trento (2007) es_ES
dc.description.references Gómez-Pérez, A., Corcho, O.: Ontology languages for the semantic web. IEEE Intell. Syst. 17(1), 54–60 (2002) es_ES
dc.description.references Gomez-Perez, A., Fernández-López, M., Corcho, O.: Ontological Engineering: With Examples from the Areas of Knowledge Management. Springer, E-Commerce and the Semantic Web (2004) es_ES
dc.description.references Grégio, A., Bonacin, R., Nabuco, O., Afonso, V.M., De Geus, P.L., Jino, M.: Ontology for malware behavior: a core model proposal. In: 2014 IEEE 23rd International WETICE Conference, pp. 453–458. IEEE (2014) es_ES
dc.description.references Gruber, T.R., et al.: A translation approach to portable ontology specifications. Knowl. Acquis. 5(2), 199–220 (1993) es_ES
dc.description.references Guarino, N.: The ontological level. Philos. Cogn. Sci. (1994) es_ES
dc.description.references Guarino, N.: Formal ontology in information systems. In: Proceedings of the 1st International Conference, pp. 6–8. IOS Press, Trento, Italy (1998) es_ES
dc.description.references Guarino, N.: The ontological level: revisiting 30 years of knowledge representation. In: Conceptual Modeling: Foundations and Applications, pp. 52–67 (2009) es_ES
dc.description.references Guarino, N., Poli, R.: The role of formal ontology in the information technnology. Int. J. Hum. Comput. Stud. 43(5–6), 623–965 (1995) es_ES
dc.description.references Guizzardi, G.: Ontological Foundations for Structural Conceptual Models. CTIT, Centre for Telematics and Information Technology, New Delhi (2005) es_ES
dc.description.references Guizzardi, G.: The role of foundational ontology for conceptual modeling and domain ontology representation, keynote paper. In: 7th International Baltic Conference on Databases and Information Systems (DB &IS). IEEE Press, Vilnius (2006) es_ES
dc.description.references Guizzardi, G.: On ontology, ontologies, conceptualizations, modeling languages, and (meta) models. Front. Artif. Intell. Appl. 155, 18 (2007) es_ES
dc.description.references Guizzardi, G.: Ontology-based evaluation and design of visual conceptual modeling languages. In: Domain Engineering, pp. 317–347. Springer (2013) es_ES
dc.description.references Guizzardi, G.: Ontological patterns, anti-patterns and pattern languages for next-generation conceptual modeling. In: International Conference on Conceptual Modeling, pp. 13–27. Springer (2014) es_ES
dc.description.references Guizzardi, G., Zamborlini, V.: Using a trope-based foundational ontology for bridging different areas of concern in ontology-driven conceptual modeling. Sci. Comput. Program. 96, 417–443 (2014) es_ES
dc.description.references Guizzardi, G., Pires, L.F,, Van Sinderen, M.: An ontology-based approach for evaluating the domain appropriateness and comprehensibility appropriateness of modeling languages. In: MoDELS, pp. 691–705. Springer (2005) es_ES
dc.description.references Hadar, E., Hassanzadeh, A.: Big data analytics on cyber attack graphs for prioritizing agile security requirements. In: 2019 IEEE 27th International Requirements Engineering Conference (RE), pp. 330–339. IEEE (2019) es_ES
dc.description.references Hele-Mai, H., Tanel-Lauri, L.: A survey of concept-based information retrieval tools on the web. In: Proceedings of the 5th East-European Conference AD BIS, pp. 29–41 (2001) es_ES
dc.description.references Herre, H.: General formal ontology (GFO): a foundational ontology for conceptual modelling. In: Theory and Applications of Ontology: Computer Applications. pp. 297–345. Springer (2010) es_ES
dc.description.references Iannacone, M., Bohn, S., Nakamura, G., Gerth, J., Huffer, K., Bridges, R., Ferragut, E., Goodall, J.: Developing an ontology for cyber security knowledge graphs. In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR ’15, pp. 12:1–12:4. ACM, New York, NY, USA (2015) es_ES
dc.description.references Islam, C., Babar, M.A., Nepal, S.: Automated Interpretation and Integration of Security Tools Using Semantic Knowledge. Springer, Berlin (2019). https://doi.org/10.1007/978-3-030-21290-2_32 es_ES
dc.description.references ISO Central Secretary: Information Technology—Security Techniques—Information Security Risk Management. Standard ISO/IEC 27005:2011, International Organization for Standardization, Geneva (2011) es_ES
dc.description.references ISO Central Secretary: Information Technology—Security Techniques—Guidelines for Cybersecurity. Standard ISO/IEC 27032:2012, International Organization for Standardization, Geneva (2012) es_ES
dc.description.references ISO Central Secretary: Information Technology—Security Techniques—Information Security Management Systems—Overview and Vocabulary. Standard ISO/IEC 27000:2018-02, International Organization for Standardization, Geneva (2018) es_ES
dc.description.references ISO Central Secretary: Information Technology—Security Techniques—Information Security Risk Management. Standard ISO/IEC 27005:2018, International Organization for Standardization, Geneva (2018) es_ES
dc.description.references Jacobsen, A., de Miranda, A.R., Juty, N.S., Batista, D., Coles, S.J., Cornet, R., Courtot, M., Crosas, M., Dumontier, M., Evelo, C.T.A., Goble, C.A., Guizzardi, G., Hansen, K.K., Hasnain, A., Hettne, K.M., Heringa, J., Hooft, R.W.W., Imming, M., Jeffery, K.G., Kaliyaperumal, R., Kersloot, M.G., Kirkpatrick, C.R., Kuhn, T., Labastida, I., Magagna, B., McQuilton, P., Meyers, N., Montesanti, A., van Reisen, M., Rocca-Serra, P., Pergl, R., Sansone, S., da Silva Santos, L.O.B., Schneider, J., Strawn, G.O., Thompson, M., Waagmeester, A., Weigel, T., Wilkinson, M.D., Willighagen, E.L., Wittenburg, P., Roos, M., Mons, B., Schultes, E.: FAIR principles: interpretations and implementation considerations. Data Intell. 2(1–2), 10–29 (2020). https://doi.org/10.1162/dint_r_00024 es_ES
dc.description.references Jia, Y., Qi, Y., Shang, H., Jiang, R., Li, A.: A practical approach to constructing a knowledge graph for cybersecurity. Engineering 4(1), 53–60 (2018) es_ES
dc.description.references Jurisica, I., Mylopoulos, J., Yu, E,: Using ontologies for knowledge management: an information systems perspective. In: Proceedings of the Annual Meeting-American Society For Information Science, Information Today; 1998, vol. 36, pp. 482–496 (1999) es_ES
dc.description.references Kang, D., Lee, J., Choi, S., Kim, K.: An ontology-based enterprise architecture. Expert Syst. Appl. 37(2), 1456–1464 (2010). https://doi.org/10.1016/j.eswa.2009.06.073 es_ES
dc.description.references Keil, J.M., Schindler, S.: Comparison and evaluation of ontologies for units of measurement. Semant. Web 10(1), 33–51 (2019) es_ES
dc.description.references Kiesling, E., Ekelhart, A., Kurniawan, K., Ekaputra, F.: The SEPSES Knowledge Graph: An Integrated Resource for Cybersecurity, vol. 11779 LNCS. Springer (2019). https://doi.org/10.1007/978-3-030-30796-7_13 es_ES
dc.description.references Langer, L., Smith, P., Hutle, M.: Smart grid cybersecurity risk assessment. In: 2015 International Symposium on Smart Electric Distribution Systems and Technologies (EDST), pp. 475–482 (2015). https://doi.org/10.1109/SEDST.2015.7315255 es_ES
dc.description.references Lassila, O., McGuinness, D.: The role of frame-based representation on the semantic web. Linköping Electron. Artic. Comput. Inf. Sci. 6(5), 2001 (2001) es_ES
dc.description.references Li, K., Zhou, H., Tu, Z., Feng, B.: CSKB: A Cyber Security Knowledge Base Based on Knowledge Graph, vol. 1268 CCIS. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-9129-7_8 es_ES
dc.description.references Martins, B.F., Serrano, L., Reyes, J.F., Panach, J.I., Pastor, O., Rochwerger, B.: Conceptual characterization of cybersecurity ontologies. In: 13th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modelling (PoEM 2020), pp. 323–338. Springer (2020) es_ES
dc.description.references Martins, B.F., Serrano, L., Reyes, J.F., Panach, J.I., Pastor, O.: Towards the Consolidation of Cybersecurity Standardized Definitions. Technical Report Version 2, Universidad Politecnica de Valencia (2021). http://hdl.handle.net/10251/163895 es_ES
dc.description.references Martins, B.F., Serrano, L., Reyes, J.F., Panach, J.I., Pastor, O.: Towards the consolidation of cybersecurity standardized definitions: a tool for ontological analysis. In: Proceedings of the XXIV Iberoamerican Conference on Software Engineering, CIbSE 2021, pp. 1–14, San José, Costa Rica (2021) es_ES
dc.description.references Mascardi, V., Cordì, V., Rosso, P.: A comparison of upper ontologies. In: WOA, vol. 2007, pp. 55–64 (2007) es_ES
dc.description.references Masolo, C., Borgo, S., Gangemi, A., Guarino, N., Oltramari, A., Schneider, L.: The WonderWeb library of foundational ontologies: preliminary report. WonderWeb Deliverable D 17 (2002). https://www.bibsonomy.org/bibtex/2e13335234623f07ce0788f9d892e7169/berrueta es_ES
dc.description.references Masolo, C., Borgo, S., Gangemi, A., Guarino, N., Oltramari, A.: Wonderweb deliverable d18 ontology library (final). ICT Project 33052, 31 (2003) es_ES
dc.description.references Mizoguchi, R., Ikeda, M.: Towards ontology engineering. J. Jpn. Soc. Artif. Intell. 13, 9–10 (1998) es_ES
dc.description.references Möller, D.P.F.: Cybersecurity Ontology, pp. 99–109. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-60570-4_7 es_ES
dc.description.references Mozzaquatro, B.A., Agostinho, C., Goncalves, D., Martins, J., Jardim-Goncalves, R.: An ontology-based cybersecurity framework for the internet of things. Sensors 18(9), 3053 (2018) es_ES
dc.description.references Mundie, D.A., Ruefle, R., Dorofee, A.J., Perl, S.J., McCloud, J., Collins, M.: An incident management ontology. In: STIDS, pp. 62–71 (2014) es_ES
dc.description.references Narayanan, S., Ganesan, A., Joshi, K., Oates, T., Joshi, A., Finin, T.: Cognitive techniques for early detection of cybersecurity events (2018). arXiv preprint arXiv:1808.00116 es_ES
dc.description.references Nurse, J.R.C., Creese, S., Goldsmith, M., Lamberts, K.: Trustworthy and effective communication of cybersecurity risks: a review. In: 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST), pp. 60–68 (2011). https://doi.org/10.1109/STAST.2011.6059257 es_ES
dc.description.references Obrst, L., Chase, P., Markeloff, R.: Developing an ontology of the cyber security domain. In: STIDS, pp. 49–56 (2012) es_ES
dc.description.references Oltramari, A., Kott, A.: Towards a reconceptualisation of cyber risk: an empirical and ontological study. J. Inf. Warf. 17(1), 49–73 (2018) es_ES
dc.description.references Oltramari, A., Vetere, G., Lenzerini, M., Gangemi, A., Guarino, N.: Senso comune. In: LREC (2010) es_ES
dc.description.references Oltramari, A., Cranor, L.F., Walls, R.J., McDaniel, P.D.: Building an ontology of cyber security. In: STIDS, pp. 54–61. Citeseer (2014) es_ES
dc.description.references Oltramari, A., Cranor, L.F., Walls, R.J., McDaniel, P.: Computational ontology of network operations. In: MILCOM 2015–2015 IEEE Military Communications Conference, pp. 318–323. IEEE (2015) es_ES
dc.description.references Oltramari, A., Henshel, D.S., Cains, M., Hoffman, B.: Towards a human factors ontology for cyber security. In: STIDS, pp. 26–33 (2015) es_ES
dc.description.references Onwubiko, C.: Cocoa: an ontology for cybersecurity operations centre analysis process. In: 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), pp. 1–8 (2018) es_ES
dc.description.references Ou, X., Govindavajhala, S., Appel, A.W.: Mulval: a logic-based network security analyzer. In: USENIX Security Symposium, vol. 8, pp. 113–128, Baltimore (2005) es_ES
dc.description.references Parmelee, M.C.: Toward an ontology architecture for cyber-security standards. STIDS 713, 116–123 (2010) es_ES
dc.description.references Peciña, K., Bilbao, A., Bilbao, E.: Physical and logical security risk analysis model. In: 2011 Carnahan Conference on Security Technology, pp. 1–7 (2011). https://doi.org/10.1109/CCST.2011.6095895 es_ES
dc.description.references Pipa, A.M.C.: Owl Ontology Quality Assessment and Optimization in the Cybersecurity Domain. Ph.D. thesis, Instituto Universitário de Lisboa (2018) es_ES
dc.description.references Qin, S., Chow, K.P.: Automatic analysis and reasoning based on vulnerability knowledge graph. In: Ning, H. (ed.) Communications in Computer and Information Science, vol. 1137 CCIS, pp. 3–19. Springer Singapore, Singapore (2019). https://doi.org/10.1007/978-981-15-1922-2_1 es_ES
dc.description.references Sales, T.P., Guizzardi, G.: Ontological anti-patterns in taxonomic structures. In: ONTOBRAS (2019) es_ES
dc.description.references Sales, T.P., Baião, F., Guizzardi, G., Almeida, J.P.A., Guarino, N., Mylopoulos, J.: The common ontology of value and risk. In: International Conference on Conceptual Modeling, pp. 121–135. Springer (2018) es_ES
dc.description.references Scarpato, N., Cilia, N.D., Romano, M.: Reachability matrix ontology: a cybersecurity ontology. Appl. Artif. Intell. 33(7), 643–655 (2019) es_ES
dc.description.references Schumacher, M.: 6. Toward a security core ontology. In: Security Engineering with Patterns, pp. 87–96. Springer (2003) es_ES
dc.description.references Serrano, L., Martins, B.F., Serrano, J.F., Panach, J.I., Pastor, O.: Una encuesta acerca de la Definición de Conceptos de Ciberseguridad. Technical Report Version 1, Universidad Politecnica de Valencia (2021). https://riunet.upv.es/handle/10251/174756 es_ES
dc.description.references Sikos, L.F.: OWL Ontologies in Cybersecurity: Conceptual Modeling of Cyber-Knowledge, pp. 1–17. Springer, Cham (2019) es_ES
dc.description.references Simperl, E., Bürger, T., Hangl, S., Wörgl, S., Popov, I.: Ontocom: a reliable cost estimation method for ontology development projects. J. Web Semant. 16, 1–16 (2012) es_ES
dc.description.references Singhal, A., Ou, X.: Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs, pp. 53–73. Springer, Berlin (2017) es_ES
dc.description.references Souag, A., Salinesi, C., Comyn-Wattiau, I.: Ontologies for security requirements: a literature survey and classification. In: International Conference on Advanced Information Systems Engineering, pp. 61–69. Springer (2012) es_ES
dc.description.references Studer, R., Benjamins, V.R., Fensel, D.: Knowledge engineering: principles and methods. Data Knowl. Eng. 25(1–2), 161–197 (1998) es_ES
dc.description.references Syed, R.: Cybersecurity Vulnerability Management: A Conceptual Ontology and Cyber Intelligence Alert System 57(6), 10334. (2020). https://doi.org/10.1016/j.im.2020.103334 es_ES
dc.description.references Syed, R., Zhong, H.: Cybersecurity Vulnerability Management: An Ontology-Based Conceptual Model (2018). https://aisel.aisnet.org/amcis2018/Semantics/Presentations/6 es_ES
dc.description.references Syed, Z., Padia, A., Finin, T., Mathews, L., Joshi, A.: UCO: a unified cybersecurity ontology. In: Workshops at the Thirtieth AAAI Conference on Artificial Intelligence (2016) es_ES
dc.description.references Takahashi, T., Kadobayashi, Y.: Cybersecurity information exchange techniques: cybersecurity information ontology and cybex. J. Natl. Inst. Inf. Commun. Technol. 58(3/4) (2011) es_ES
dc.description.references Takahashi, T., Kadobayashi, Y.: Reference ontology for cybersecurity operational information. Comput. J. 58(10), 2297–2312 (2015) es_ES
dc.description.references Takahashi, T., Fujiwara, H., Kadobayashi, Y.: Building ontology of cybersecurity operational information. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information intelligence Research, pp. 1–4 (2010) es_ES
dc.description.references Takahashi, T., Kadobayashi, Y., Fujiwara, H.: Ontological approach toward cybersecurity in cloud computing. In: Proceedings of the 3rd International Conference on Security of Information and Networks, pp. 100–109 (2010) es_ES
dc.description.references Tissir, N., El Kafhali, S., Aboutabit, N.: Cybersecurity management in cloud computing: semantic literature review and conceptual framework proposal. J. Reliab. Intell. Environ. (2020). https://doi.org/10.1007/s40860-020-00115-0 es_ES
dc.description.references Undercofer, J., Joshi, A., Finin, T., Pinkston, J., et al.: A target-centric ontology for intrusion detection. In: Workshop on Ontologies in Distributed Systems, held at the 18th International Joint Conference on Artificial Intelligence (2003) es_ES
dc.description.references Uschold, M., Gruninger, M.: Ontologies and semantics for seamless connectivity. ACM SIGMod Rec. 33(4), 58–64 (2004) es_ES
dc.description.references Uschold, M., Gruninger, M., et al.: Ontologies: Principles, Methods and Applications. Technical Report, University of Edinburgh Artificial Intelligence Applications Institute AIAI TR (1996) es_ES
dc.description.references Van Heijst, G., Schreiber, A.T., Wielinga, B.J.: Using explicit ontologies in kbs development. Int. J. Hum. Comput. Stud. 46(2–3), 183–292 (1997). https://doi.org/10.1006/ijhc.1996.0090 es_ES
dc.description.references Wand, Y., Weber, R.: On the deep structure of information systems. Inf. Syst. J. 5(3), 203–223 (1995) es_ES
dc.description.references Wang, J.A., Guo, M.: Ovm: an ontology for vulnerability management. In: 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, pp. 1–4 (2009) es_ES
dc.description.references Wang, J.Z., Ali, F.: An efficient ontology comparison tool for semantic web applications. In: The 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI’05), pp. 372–378. IEEE (2005) es_ES
dc.description.references Wieringa, R.: Design Science Methodology for Information Systems and Software Engineering. Springer, Berlin (2014) es_ES
dc.description.references Zuanelli, E.: The cybersecurity ontology platform: the POC solution. In: e-AGE2017, p. 1 (2017) es_ES
dc.relation.references 10.1016/j.csi.2012.01.007 es_ES
dc.relation.references 10.1007/978-3-319-51100-9_15 es_ES
dc.relation.references 10.1007/978-3-642-01347-8_44 es_ES
dc.relation.references 10.5220/0006510400800085 es_ES
dc.relation.references 10.4018/978-1-60960-593-3.ch008 es_ES
dc.relation.references 10.1109/ARES.2008.33 es_ES
dc.relation.references 10.1145/505168.505173 es_ES
dc.relation.references 10.1007/978-3-030-00847-5_25 es_ES
dc.relation.references 10.1109/CSCloud.2016.45 es_ES
dc.relation.references 10.1504/IJBPIM.2009.032281 es_ES
dc.relation.references 10.1007/978-3-662-04396-7_2 es_ES
dc.relation.references 10.1109/CSET.2019.8904905 es_ES
dc.relation.references 10.1109/5254.988453 es_ES
dc.relation.references 10.1109/WETICE.2014.72 es_ES
dc.relation.references 10.1006/knac.1993.1008 es_ES
dc.relation.references 10.1007/978-3-642-02463-4_4 es_ES
dc.relation.references 10.1006/ijhc.1995.1064 es_ES
dc.relation.references 10.1007/978-3-642-36654-3_13 es_ES
dc.relation.references 10.1007/978-3-319-12206-9_2 es_ES
dc.relation.references 10.1016/j.scico.2014.02.022 es_ES
dc.relation.references 10.1007/11557432_51 es_ES
dc.relation.references 10.1109/RE.2019.00042 es_ES
dc.relation.references 10.1007/978-90-481-8847-5_14 es_ES
dc.relation.references 10.1145/2746266.2746278 es_ES
dc.relation.references 10.1007/978-3-030-21290-2_32 es_ES
dc.relation.references 10.1162/dint\_r_00024 es_ES
dc.relation.references 10.1016/j.eng.2018.01.004 es_ES
dc.relation.references 10.1016/j.eswa.2009.06.073 es_ES
dc.relation.references 10.3233/SW-180310 es_ES
dc.relation.references 10.1007/978-3-030-30796-7_13 es_ES
dc.relation.references 10.1109/SEDST.2015.7315255 es_ES
dc.relation.references 10.1007/978-981-15-9129-7_8 es_ES
dc.relation.references 10.1007/978-3-030-63479-7_22 es_ES
dc.relation.references 10.1007/978-3-030-60570-4_7 es_ES
dc.relation.references 10.3390/s18093053 es_ES
dc.relation.references 10.1109/STAST.2011.6059257 es_ES
dc.relation.references 10.1109/MILCOM.2015.7357462 es_ES
dc.relation.references 10.1109/CyberSA.2018.8551486 es_ES
dc.relation.references 10.1109/CCST.2011.6095895 es_ES
dc.relation.references 10.1007/978-981-15-1922-2_1 es_ES
dc.relation.references 10.1007/978-3-030-00847-5_11 es_ES
dc.relation.references 10.1080/08839514.2019.1592344 es_ES
dc.relation.references 10.1007/978-3-540-45180-8_6 es_ES
dc.relation.references 10.1007/978-3-319-98842-9_1 es_ES
dc.relation.references 10.1016/j.websem.2012.07.001 es_ES
dc.relation.references 10.1007/978-3-319-66505-4_3 es_ES
dc.relation.references 10.1007/978-3-642-31069-0_5 es_ES
dc.relation.references 10.1016/S0169-023X(97)00056-6 es_ES
dc.relation.references 10.1016/j.im.2020.103334 es_ES
dc.relation.references 10.1093/comjnl/bxu101 es_ES
dc.relation.references 10.1145/1852666.1852756 es_ES
dc.relation.references 10.1145/1854099.1854121 es_ES
dc.relation.references 10.1007/s40860-020-00115-0 es_ES
dc.relation.references 10.1145/1041410.1041420 es_ES
dc.relation.references 10.1017/S0269888900007797 es_ES
dc.relation.references 10.1006/ijhc.1996.0090 es_ES
dc.relation.references 10.1111/j.1365-2575.1995.tb00108.x es_ES
dc.relation.references 10.1145/1558607.1558646 es_ES
dc.relation.references 10.1007/978-3-662-43839-8 es_ES


Ficheros en el ítem

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

 

Tema móvil para Riunet