How FAIR are security core ontologies? A systematic map** study

Í Oliveira, M Fumagalli, T Prince Sales… - … Conference on Research …, 2021‏ - Springer
Recently, ontology-based approaches to security, in particular to information security, have
been recognized as a relevant challenge and as an area of research interest of its own. As …

Towards an ontology of security assessment: a core model proposal

F de Franco Rosa, M **o, R Bonacin - Information Technology-New …, 2018‏ - Springer
Abstract SecAOnto (Security Assessment Ontology) aims at formalizing the knowledge on
“Security Assessment”. A conceptual formalization of this area is needed, given that there is …

Cyber supply chain threat analysis and prediction using machine learning and ontology

A Yeboah-Ofori, H Mouratidis, U Ismai, S Islam… - … and Innovations: 17th …, 2021‏ - Springer
Abstract Cyber Supply Chain (CSC) security requires a secure integrated network among
the sub-systems of the inbound and outbound chains. Adversaries are deploying various …

An ontology-based approach for hel** to secure the ETSI machine-to-machine architecture

A Gyrard, C Bonnet, K Boudaoud - 2014 IEEE International …, 2014‏ - ieeexplore.ieee.org
Securing the Internet of Things, more precisely, the ETSI Machine to Machine (M2M)
architecture is a difficult task, since there is a need to secure heterogeneous wireless …

Designing cross-domain semantic Web of things applications

A Gyrard - 2015‏ - pastel.hal.science
According to Cisco's predictions, there will be more than 50 billions of devices connected to
the Internet by 2020. The devices and produced data are mainly exploited to build domain …

A core IoT ontology for automation support in edge computing

S Ghrab, I Lahyani, S Yangui, M Jmaiel - Service Oriented Computing and …, 2023‏ - Springer
Abstract Service providers provision more and more Internet-of-Things (IoT) services in the
cloud for dynamicity and cost-effectiveness purposes. This is made possible thanks to the …