Cybersecurity solutions are highly based on data analysis. Currently, it is not enough to make an automated decision; it also has to be explainable. The decision-making logic traceability should be provided in addition to justification by referencing different data sources and evidence. However, the existing security ontologies, used for the implementation of expert systems and serving as a knowledge base, lack interconnectivity between different data sources and computer-readable linking to the data source. Therefore, this paper aims to increase the possibilities of ontology-based cyber intelligence solutions, by presenting a security ontology structure for data storage to the ontology from different text-based data sources, supporting the...
Prevention of exploits requires timely intelligence about the cybersecurity vulnerabilities and thre...
The issue of information security is fundamental in today’s society we live in have a wide variety o...
Security concerns for physical, software and virtual worlds have captured the attention of researche...
The past several years we have witnessed that information has become the most precious asset, while ...
Considering the continuous growth in the complexity of both information systems and security informa...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...
This paper addresses the issue of accommodating security requirements in application development. It...
We present the structure of an ontology for Information Security (IS), applied to the extraction of ...
A large amount of different security documents, standards, guidelines and best practices requires to...
International audienceSecurity is an important issue that needs to be taken into account at all stag...
Abstract—Situation awareness depends on a reliable perception of the environment and comprehension o...
This paper presents an overview of ontologies in Information Systems Security. Information Systems...
This paper introduces an ontology-based framework to improve the preparation of ISO/IEC 27001 audits...
Security requirements managers aim at eliciting, reusing and keeping their sets of requirements. The...
Nowadays, there are different kinds of public knowledge bases for cyber security vulnerability and t...
Prevention of exploits requires timely intelligence about the cybersecurity vulnerabilities and thre...
The issue of information security is fundamental in today’s society we live in have a wide variety o...
Security concerns for physical, software and virtual worlds have captured the attention of researche...
The past several years we have witnessed that information has become the most precious asset, while ...
Considering the continuous growth in the complexity of both information systems and security informa...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...
This paper addresses the issue of accommodating security requirements in application development. It...
We present the structure of an ontology for Information Security (IS), applied to the extraction of ...
A large amount of different security documents, standards, guidelines and best practices requires to...
International audienceSecurity is an important issue that needs to be taken into account at all stag...
Abstract—Situation awareness depends on a reliable perception of the environment and comprehension o...
This paper presents an overview of ontologies in Information Systems Security. Information Systems...
This paper introduces an ontology-based framework to improve the preparation of ISO/IEC 27001 audits...
Security requirements managers aim at eliciting, reusing and keeping their sets of requirements. The...
Nowadays, there are different kinds of public knowledge bases for cyber security vulnerability and t...
Prevention of exploits requires timely intelligence about the cybersecurity vulnerabilities and thre...
The issue of information security is fundamental in today’s society we live in have a wide variety o...
Security concerns for physical, software and virtual worlds have captured the attention of researche...