How FAIR are security core ontologies? A systematic map** study
Recently, ontology-based approaches to security, in particular to information security, have
been recognized as a relevant challenge and as an area of research interest of its own. As …
been recognized as a relevant challenge and as an area of research interest of its own. As …
Towards an ontology of security assessment: a core model proposal
Abstract SecAOnto (Security Assessment Ontology) aims at formalizing the knowledge on
“Security Assessment”. A conceptual formalization of this area is needed, given that there is …
“Security Assessment”. A conceptual formalization of this area is needed, given that there is …
Cyber supply chain threat analysis and prediction using machine learning and ontology
Abstract Cyber Supply Chain (CSC) security requires a secure integrated network among
the sub-systems of the inbound and outbound chains. Adversaries are deploying various …
the sub-systems of the inbound and outbound chains. Adversaries are deploying various …
An ontology-based approach for hel** to secure the ETSI machine-to-machine architecture
Securing the Internet of Things, more precisely, the ETSI Machine to Machine (M2M)
architecture is a difficult task, since there is a need to secure heterogeneous wireless …
architecture is a difficult task, since there is a need to secure heterogeneous wireless …
Designing cross-domain semantic Web of things applications
A Gyrard - 2015 - pastel.hal.science
According to Cisco's predictions, there will be more than 50 billions of devices connected to
the Internet by 2020. The devices and produced data are mainly exploited to build domain …
the Internet by 2020. The devices and produced data are mainly exploited to build domain …
A core IoT ontology for automation support in edge computing
Abstract Service providers provision more and more Internet-of-Things (IoT) services in the
cloud for dynamicity and cost-effectiveness purposes. This is made possible thanks to the …
cloud for dynamicity and cost-effectiveness purposes. This is made possible thanks to the …