Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system

R Syed - Information & Management, 2020 - Elsevier
Effective vulnerability management requires the integration of vulnerability information
available on multiple sources, including social media. The information could be used to …

The SEPSES knowledge graph: an integrated resource for cybersecurity

E Kiesling, A Ekelhart, K Kurniawan… - International Semantic …, 2019 - Springer
This paper introduces an evolving cybersecurity knowledge graph that integrates and links
critical information on real-world vulnerabilities, weaknesses and attack patterns from …

A security ontology for security requirements elicitation

A Souag, C Salinesi, R Mazo… - International symposium on …, 2015 - Springer
Security is an important issue that needs to be taken into account at all stages of information
system development, including early requirements elicitation. Early analysis of security …

Ontology-based information security compliance determination and control selection on the example of ISO 27002

S Fenz, T Neubauer - Information & Computer Security, 2018 - emerald.com
Purpose The purpose of this paper is to provide a method to formalize information security
control descriptions and a decision support system increasing the automation level and …

Map** information security standard ISO 27002 to an ontological structure

S Fenz, S Plieschnegger, H Hobel - Information & Computer Security, 2016 - emerald.com
Purpose The purpose of this paper is to increase the degree of automation within
information security compliance projects by introducing a formal representation of the ISO …

Evaluating Incident Response in CSIRTs using Cube Socio-technical Systems Analysis

HS Galadima, C Doherty, N McDonald, J Liang… - Computer Standards & …, 2025 - Elsevier
This paper provides a novel method for evaluating Incident Response (IR) teams through
the application of the Cube Socio-technical Systems Analysis (STSA) methodology. Cube is …

Ontology in information security

K Arbanas, M Čubrilo - Journal of information and organizational …, 2015 - hrcak.srce.hr
Sažetak The past several years we have witnessed that information has become the most
precious asset, while protection and security of information is becoming an ever greater …

[PDF][PDF] The Evaluation Process of a Computer Security Incident Ontology.

LAF Martimiano, E dos Santos Moreira - WONTO, 2006 - informatik.rwth-aachen.de
Ontologies have been developed and used by several researchers in different knowledge
domains aiming to ease the structuring and management of knowledge, and to create a …

Ontology-based security problem definition and solution for the common criteria compliant development process

A Bialas - … Fourth International Conference on Dependability of …, 2009 - ieeexplore.ieee.org
The paper shows how to apply a new ontology-based approach to the security problem
definition (SPD), which is the key stage of the IT security development process compliant …

[PDF][PDF] Ontology-based risk control for the incident management

TJ Chiang, JS Kouh, RI Chang - International Journal of Computer …, 2009 - researchgate.net
Both non-profit and commercial organizations rely heavily on information to process their
daily activities. The information security management standards are widely used and …