How FAIR are security core ontologies? A systematic mapping study

Í Oliveira, M Fumagalli, T Prince Sales… - … Conference on Research …, 2021 - Springer
Recently, ontology-based approaches to security, in particular to information security, have
been recognized as a relevant challenge and as an area of research interest of its own. As …

Comparative study of ontologies based iso 27000 series security standards

I Meriah, LBA Rabai - Procedia Computer Science, 2019 - Elsevier
Security management standards as ISO/IEC 27000 series provide guidelines, which enable
to evaluate the security in the company on a continuous basis. Security ontology technology …

Towards an ontology of security assessment: a core model proposal

F de Franco Rosa, M Jino, R Bonacin - Information Technology-New …, 2018 - Springer
Abstract SecAOnto (Security Assessment Ontology) aims at formalizing the knowledge on
“Security Assessment”. A conceptual formalization of this area is needed, given that there is …

A combined security ontology based on the unified foundational ontology

M Adach, K Hänninen… - 2022 IEEE 16th …, 2022 - ieeexplore.ieee.org
While ontology comparison and alignment have been extensively researched in the last
decade, there are still some challenges to these disciplines, such as incomplete ontologies …

Information security maturity model: A best practice driven approach to PCI DSS compliance

S Yulianto, C Lim, B Soewito - 2016 IEEE Region 10 …, 2016 - ieeexplore.ieee.org
A successful of PCI DSS implementation depends on the capability of the organization's
information security in providing the effective safeguard of their information asset, while …

[HTML][HTML] Automated Conversion of CVE Records into an Expert System, Dedicated to Information Security Risk Analysis, Knowledge-Base Rules

D Benetis, D Vitkus, J Janulevičius, A Čenys… - Electronics, 2024 - mdpi.com
Expert systems (ESs) can be seen as a perspective method for risk analysis process
automation, especially in the case of small-and medium-sized enterprises that lack internal …

Security ontology structure for formalization of security document knowledge

S Ramanauskaitė, A Shein, A Čenys, J Rastenis - Electronics, 2022 - mdpi.com
Cybersecurity solutions are highly based on data analysis. Currently, it is not enough to
make an automated decision; it also has to be explainable. The decision-making logic …

Cyber-security policy decisions in small businesses

J Patterson - 2017 - search.proquest.com
Cyber-attacks against small businesses are on the rise yet small business owners often lack
effective strategies to avoid these attacks. The purpose of this qualitative multiple case study …

Ontologies for network security and future challenges

D Velasco, G Rodriguez - arXiv preprint arXiv:1704.02441, 2017 - arxiv.org
Efforts have been recently made to construct ontologies for network security. The proposed
ontologies are related to specific aspects of network security. Therefore, it is necessary to …

Relationship-Based AES Security Model for Social Internet of Things

KS Santhosh Kumar, J Hanumanthappa… - Intelligent Systems and …, 2023 - Springer
Abstract Social Internet of Things is the rising contemporary of computer science and
information technology. It combines the concept of a social network with the Internet of …