Considering the continuous growth in the complexity of both information systems and security information, it becomes more and more necessary to provide solutions that facilitate the user in the management and use of these large and complex knowledge-bases. In the last years we have seen the birth of more and more examples that propose ontologies, semantically rich descriptions of entities and relations for the management of security information. The aim of this work is to provide an ontology that (i) supports a formal description of an ICT system, (ii) relates it to its potential vulnerabilities, possible attack vectors, and available mitigations, (iii) allows inferring a tight relationship between IT/OT assets and their vulnerabilities. Gi...
This study aims to propose a knowledge base ontology for the ISO/SAE 21434 cybersecurity risk assess...
One of the major cyber security challenges we face today is overcoming the current limits of securit...
In the paper the usage of the ontological approach, description logics and logical inference to the ...
Prevention of exploits requires timely intelligence about the cybersecurity vulnerabilities and thre...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...
Cybersecurity solutions are highly based on data analysis. Currently, it is not enough to make an au...
Abstract—Situation awareness depends on a reliable perception of the environment and comprehension o...
The use of sensors and actuators as a form of controlling cyber-physical systems in resource network...
Software systems have become highly distributed and complex involving independent components working...
The intense transformations that have taken place in society in this decade have made information sy...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
AbstractAs the computer network has evolved to provide the user many services, the attacks on these ...
The integration of networks within an organization made many critical infrastructures (CI) and their...
We first consider network security services and then review threats, vulnerabilities and failure mo...
This study aims to propose a knowledge base ontology for the ISO/SAE 21434 cybersecurity risk assess...
One of the major cyber security challenges we face today is overcoming the current limits of securit...
In the paper the usage of the ontological approach, description logics and logical inference to the ...
Prevention of exploits requires timely intelligence about the cybersecurity vulnerabilities and thre...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...
Cybersecurity solutions are highly based on data analysis. Currently, it is not enough to make an au...
Abstract—Situation awareness depends on a reliable perception of the environment and comprehension o...
The use of sensors and actuators as a form of controlling cyber-physical systems in resource network...
Software systems have become highly distributed and complex involving independent components working...
The intense transformations that have taken place in society in this decade have made information sy...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
AbstractAs the computer network has evolved to provide the user many services, the attacks on these ...
The integration of networks within an organization made many critical infrastructures (CI) and their...
We first consider network security services and then review threats, vulnerabilities and failure mo...
This study aims to propose a knowledge base ontology for the ISO/SAE 21434 cybersecurity risk assess...
One of the major cyber security challenges we face today is overcoming the current limits of securit...
In the paper the usage of the ontological approach, description logics and logical inference to the ...