Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system
R Syed - Information & Management, 2020 - Elsevier
Effective vulnerability management requires the integration of vulnerability information
available on multiple sources, including social media. The information could be used to …
available on multiple sources, including social media. The information could be used to …
The SEPSES knowledge graph: an integrated resource for cybersecurity
This paper introduces an evolving cybersecurity knowledge graph that integrates and links
critical information on real-world vulnerabilities, weaknesses and attack patterns from …
critical information on real-world vulnerabilities, weaknesses and attack patterns from …
A security ontology for security requirements elicitation
Security is an important issue that needs to be taken into account at all stages of information
system development, including early requirements elicitation. Early analysis of security …
system development, including early requirements elicitation. Early analysis of security …
Ontology-based information security compliance determination and control selection on the example of ISO 27002
S Fenz, T Neubauer - Information & Computer Security, 2018 - emerald.com
Purpose The purpose of this paper is to provide a method to formalize information security
control descriptions and a decision support system increasing the automation level and …
control descriptions and a decision support system increasing the automation level and …
Map** information security standard ISO 27002 to an ontological structure
S Fenz, S Plieschnegger, H Hobel - Information & Computer Security, 2016 - emerald.com
Purpose The purpose of this paper is to increase the degree of automation within
information security compliance projects by introducing a formal representation of the ISO …
information security compliance projects by introducing a formal representation of the ISO …
Evaluating Incident Response in CSIRTs using Cube Socio-technical Systems Analysis
This paper provides a novel method for evaluating Incident Response (IR) teams through
the application of the Cube Socio-technical Systems Analysis (STSA) methodology. Cube is …
the application of the Cube Socio-technical Systems Analysis (STSA) methodology. Cube is …
Ontology in information security
Sažetak The past several years we have witnessed that information has become the most
precious asset, while protection and security of information is becoming an ever greater …
precious asset, while protection and security of information is becoming an ever greater …
[PDF][PDF] The Evaluation Process of a Computer Security Incident Ontology.
Ontologies have been developed and used by several researchers in different knowledge
domains aiming to ease the structuring and management of knowledge, and to create a …
domains aiming to ease the structuring and management of knowledge, and to create a …
Ontology-based security problem definition and solution for the common criteria compliant development process
A Bialas - … Fourth International Conference on Dependability of …, 2009 - ieeexplore.ieee.org
The paper shows how to apply a new ontology-based approach to the security problem
definition (SPD), which is the key stage of the IT security development process compliant …
definition (SPD), which is the key stage of the IT security development process compliant …
[PDF][PDF] Ontology-based risk control for the incident management
Both non-profit and commercial organizations rely heavily on information to process their
daily activities. The information security management standards are widely used and …
daily activities. The information security management standards are widely used and …