{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T16:02:33Z","timestamp":1772467353420,"version":"3.50.1"},"publisher-location":"Cham","reference-count":57,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030634780","type":"print"},{"value":"9783030634797","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-63479-7_22","type":"book-chapter","created":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T08:02:56Z","timestamp":1605600176000},"page":"323-338","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Conceptual Characterization of Cybersecurity Ontologies"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9190-1047","authenticated-orcid":false,"given":"Beatriz F.","family":"Martins","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1631-7139","authenticated-orcid":false,"given":"Lenin","family":"Serrano","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9598-1301","authenticated-orcid":false,"given":"Jos\u00e9 F.","family":"Reyes","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7043-6227","authenticated-orcid":false,"given":"Jos\u00e9 Ignacio","family":"Panach","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1320-8471","authenticated-orcid":false,"given":"Oscar","family":"Pastor","sequence":"additional","affiliation":[]},{"given":"Benny","family":"Rochwerger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,18]]},"reference":[{"key":"22_CR1","volume-title":"The Description Logic Handbook: Theory, Implementation and Applications","author":"F Baader","year":"2003","unstructured":"Baader, F., et al.: The Description Logic Handbook: Theory, Implementation and Applications. Cambridge University Press, Cambridge (2003)"},{"key":"22_CR2","unstructured":"Ben-Asher, N., Oltramari, A., Erbacher, R.F., Gonzalez, C.: Ontology-based adaptive systems of cyber defense. In: STIDS. pp. 34\u201341 (2015)"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Bergner, S., Lechner, U.: Cybersecurity ontology for critical infrastructures. In: KEOD. pp. 80\u201385 (2017)","DOI":"10.5220\/0006510400800085"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Bizer, C., Heath, T., Berners-Lee, T.: Linked data:the story so far. In: Semantic Services, Interoperability and Web Applications: Emerging Concepts. pp. 205\u2013227. IGI Global (2011)","DOI":"10.4018\/978-1-60960-593-3.ch008"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Blanco, C., Lasheras, J., Valencia-Garc\u00eda, R., Fern\u00e1ndez-Medina, E., Toval, A., Piattini, M.: A systematic review and comparison of security ontologies. In: 3th International Conference on Availability, Reliability and Security. pp. 813\u2013820. IEEE (2008)","DOI":"10.1109\/ARES.2008.33"},{"key":"22_CR6","volume-title":"Vulnerability description ontology (vdo)","author":"H Booth","year":"2016","unstructured":"Booth, H., Turner, C.: Vulnerability description ontology (vdo). A Framework for Characterizing Vulnerabilities, NIST (2016)"},{"key":"22_CR7","doi-asserted-by":"publisher","unstructured":"Borgo, S., Masolo, C.: Ontological foundations of dolce. In: Poli, R., Healy, M., Kameas, A., (eds.) Theory and Applications of Ontology: Computer Applications. Springer, Dordrecht (2010) https:\/\/doi.org\/10.1007\/978-90-481-8847-5_13","DOI":"10.1007\/978-90-481-8847-5_13"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Degen, W., Heller, B., Herre, H., Smith, B.: Gol: toward an axiomatized upper-level ontology. In: Proceedings of the International Conference on Formal Ontology in Information Systems-Volume. pp. 34\u201346 (2001)","DOI":"10.1145\/505168.505173"},{"key":"22_CR9","doi-asserted-by":"publisher","unstructured":"Dietz, M., Putz, B., Pernul, G.: A distributed ledger approach to digital twin secure data sharing. In: IFIP Annual Conference on Data and Applications Security and Privacy. pp. 281\u2013300. Springer (2019)https:\/\/doi.org\/10.1007\/978-3-030-22479-0_15","DOI":"10.1007\/978-3-030-22479-0_15"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Elnagdy, S.A., Qiu, M., Gai, K.: Cyber incident classifications using ontology-based knowledge representation for cybersecurity insurance in financial industry. In: 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud). pp. 301\u2013306. IEEE (2016)","DOI":"10.1109\/CSCloud.2016.45"},{"key":"22_CR11","unstructured":"Falbo, R.D.A.: SABiO: Systematic Approach for Building Ontologies. In: Proceedings of the 1st Joint Workshop ONTO.COM\/ODISE on Ontologies in Conceptual Modeling and Information Systems Engineering (2014)"},{"key":"22_CR12","unstructured":"Fern\u00e1ndez-L\u00f3pez, M., G\u00f3mez-P\u00e9rez, A., Juristo, N.: Methontology: from ontological art towards ontological engineering. In: Proceedings of the Ontological Engineering AAAI-97 Spring Symposium Series. American Association for Artificial Intelligence (1997)"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Finkel, J.R., Grenager, T., Manning, C.: Incorporating non-local information into information extraction systems by gibbs sampling. In: Proceedings of the 43rd Annual Meeting on Association for Computational Linguistics. ACL 2005, p. 363\u2013370. USA (2005)","DOI":"10.3115\/1219840.1219885"},{"key":"22_CR14","first-page":"32","volume":"25","author":"P Giaretta","year":"1995","unstructured":"Giaretta, P., Guarino, N.: Ontologies and knowledge bases towards a terminological clarification. Towards very large knowledge bases: knowledge building & knowledge sharing 25, 32 (1995)","journal-title":"Towards very large knowledge bases: knowledge building & knowledge sharing"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Gr\u00e9gio, A., Bonacin, R., Nabuco, O., Afonso, V.M., De Geus, P.L., Jino, M.: Ontology for malware behavior: a core model proposal. In: 2014 IEEE 23rd International WETICE Conference. pp. 453\u2013458. IEEE (2014)","DOI":"10.1109\/WETICE.2014.72"},{"key":"22_CR16","unstructured":"Guarino, N.: Formal ontology in information systems. In: Proceedings of the 1st International Conference. pp. 6\u20138. IOS Press, Trento, Italy (1998)"},{"key":"22_CR17","unstructured":"Guarino, N.: The ontological level. Philosophy and the Cognitive Sciences (1994)"},{"key":"22_CR18","unstructured":"Guizzardi, G.: The role of foundational ontology for conceptual modeling and domain ontology representation, keynote paper. In: 7th International Baltic Conference on Databases and Information Systems (DB&IS), Vilnius, IEEE Press (2006)"},{"key":"22_CR19","volume-title":"Ontological Foundations for Structural Conceptual Models","author":"G Guizzardi","year":"2005","unstructured":"Guizzardi, G.: Ontological Foundations for Structural Conceptual Models. CTIT, Centre for Telematics and Information Technology (2005)"},{"key":"22_CR20","first-page":"18","volume":"155","author":"G Guizzardi","year":"2007","unstructured":"Guizzardi, G.: On ontology, ontologies, conceptualizations, modeling languages, and (meta) models. Front. Artif. Intell. Appl. 155, 18 (2007)","journal-title":"Front. Artif. Intell. Appl."},{"key":"22_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1007\/11557432_51","volume-title":"Model Driven Engineering Languages and Systems","author":"G Guizzardi","year":"2005","unstructured":"Guizzardi, G., Ferreira Pires, L., van Sinderen, M.: An ontology-based approach for evaluating the domain appropriateness and comprehensibility appropriateness of modeling languages. In: Briand, L., Williams, C. (eds.) MODELS 2005. LNCS, vol. 3713, pp. 691\u2013705. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11557432_51"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Hadar, E., Hassanzadeh, A.: Big data analytics on cyber attack graphs for prioritizing agile security requirements. In: 2019 IEEE 27th International Requirements Engineering Conference (RE). pp. 330\u2013339. IEEE (2019)","DOI":"10.1109\/RE.2019.00042"},{"key":"22_CR23","doi-asserted-by":"publisher","unstructured":"Herre, H.: General formal ontology (gfo): a foundational ontology for conceptual modelling. In: Poli, R., Healy, M., Kameas, A. (eds) Theory and Applications of Ontology: Computer Applications. Springer, Dordrecht (2010) https:\/\/doi.org\/10.1007\/978-90-481-8847-5_14","DOI":"10.1007\/978-90-481-8847-5_14"},{"issue":"1","key":"22_CR24","first-page":"4","volume":"25","author":"I Horrocks","year":"2002","unstructured":"Horrocks, I., et al.: Daml+oil: a description logic for the semantic web. IEEE Data Eng. Bull. 25(1), 4\u20139 (2002)","journal-title":"IEEE Data Eng. Bull."},{"key":"22_CR25","doi-asserted-by":"crossref","unstructured":"Iannacone, M., et al.: Developing an ontology for cyber security knowledge graphs. In: 10th Annual Cyber and Information Security Research Conference (2015)","DOI":"10.1145\/2746266.2746278"},{"issue":"1","key":"22_CR26","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.eng.2018.01.004","volume":"4","author":"Y Jia","year":"2018","unstructured":"Jia, Y., Qi, Y., Shang, H., Jiang, R., Li, A.: A practical approach to constructing a knowledge graph for cybersecurity. Engineering 4(1), 53\u201360 (2018)","journal-title":"Engineering"},{"issue":"2","key":"22_CR27","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.1016\/j.eswa.2009.06.073","volume":"37","author":"D Kang","year":"2010","unstructured":"Kang, D., Lee, J., Choi, S., Kim, K.: An ontology-based enterprise architecture. Expert Syst. Appl. 37(2), 1456\u20131464 (2010)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"22_CR28","doi-asserted-by":"publisher","first-page":"33","DOI":"10.3233\/SW-180310","volume":"10","author":"JM Keil","year":"2019","unstructured":"Keil, J.M., Schindler, S.: Comparison and evaluation of ontologies for units of measurement. Semantic Web 10(1), 33\u201351 (2019)","journal-title":"Semantic Web"},{"key":"22_CR29","unstructured":"Mascardi, V., Cord\u00ec, V., Rosso, P.: A comparison of upper ontologies. In: Woa. vol. 2007, pp. 55\u201364 (2007)"},{"issue":"9","key":"22_CR30","doi-asserted-by":"publisher","first-page":"3053","DOI":"10.3390\/s18093053","volume":"18","author":"BA Mozzaquatro","year":"2018","unstructured":"Mozzaquatro, B.A., Agostinho, C., Goncalves, D., Martins, J., Jardim-Goncalves, R.: An ontology-based cybersecurity framework for the internet of things. Sensors 18(9), 3053 (2018)","journal-title":"Sensors"},{"key":"22_CR31","unstructured":"Mundie, D.A., Ruefle, R., Dorofee, A.J., Perl, S.J., McCloud, J., Collins, M.: An incident management ontology. In: STIDS. pp. 62\u201371 (2014)"},{"key":"22_CR32","unstructured":"Narayanan, S., Ganesan, A., Joshi, K., Oates, T., Joshi, A., Finin, T.: Cognitive techniques for early detection of cybersecurity events. arXiv preprint arXiv:1808.00116 (2018)"},{"key":"22_CR33","unstructured":"Obrst, L., Chase, P., Markeloff, R.: Developing an ontology of the cyber security domain. In: STIDS. pp. 49\u201356 (2012)"},{"key":"22_CR34","doi-asserted-by":"crossref","unstructured":"Oltramari, A., Cranor, L.F., Walls, R.J., McDaniel, P.: Computational ontology of network operations. In: MILCOM 2015\u20132015 IEEE Military Communications Conference. pp. 318\u2013323. IEEE (2015)","DOI":"10.1109\/MILCOM.2015.7357462"},{"key":"22_CR35","unstructured":"Oltramari, A., Cranor, L.F., Walls, R.J., McDaniel, P.D.: Building an ontology of cyber security. In: STIDS. pp. 54\u201361. Citeseer (2014)"},{"key":"22_CR36","unstructured":"Oltramari, A., Henshel, D.S., Cains, M., Hoffman, B.: Towards a human factors ontology for cyber security. In: STIDS. pp. 26\u201333 (2015)"},{"key":"22_CR37","unstructured":"Oltramari, A., Vetere, G., Lenzerini, M., Gangemi, A., Guarino, N.: Senso comune. In: LREC (2010)"},{"key":"22_CR38","doi-asserted-by":"crossref","unstructured":"Onwubiko, C.: Cocoa: An ontology for cybersecurity operations centre analysis process. In: 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). pp. 1\u20138 (2018)","DOI":"10.1109\/CyberSA.2018.8551486"},{"key":"22_CR39","unstructured":"Ou, X., Govindavajhala, S., Appel, A.W.: Mulval: A logic-based network security analyzer. In: USENIX security symposium. vol. 8, pp. 113\u2013128. Baltimore (2005)"},{"key":"22_CR40","first-page":"116","volume":"713","author":"MC Parmelee","year":"2010","unstructured":"Parmelee, M.C.: Toward an ontology architecture for cyber-security standards. STIDS 713, 116\u2013123 (2010)","journal-title":"STIDS"},{"key":"22_CR41","unstructured":"Pipa, A.M.C.: OWL ontology quality assessment and optimization in the cybersecurity domain. Ph.D. thesis, Instituto Universit\u00e1rio de Lisboa (2018)"},{"key":"22_CR42","doi-asserted-by":"crossref","unstructured":"Rose, S., Engel, D., Cramer, N., Cowley, W.: Automatic keyword extraction from individual documents. In: Berry, M.W., Kogan, J. (eds.) Text Mining. Applications and Theory, pp. 1\u201320. John Wiley and Sons, Ltd (2010)","DOI":"10.1002\/9780470689646.ch1"},{"issue":"5","key":"22_CR43","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/1880153.1880163","volume":"40","author":"A Rutkowski","year":"2010","unstructured":"Rutkowski, A., et al.: Cybex: The cybersecurity information exchange framework (x.1500). SIGCOMM Comput. Commun. Rev. 40(5), 59\u201364 (2010)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"22_CR44","series-title":"Intelligent Systems Reference Library","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-98842-9_1","volume-title":"AI in Cybersecurity","author":"LF Sikos","year":"2019","unstructured":"Sikos, L.F.: OWL ontologies in cybersecurity: conceptual modeling of cyber-knowledge. In: Sikos, L.F. (ed.) AI in Cybersecurity. ISRL, vol. 151, pp. 1\u201317. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-98842-9_1"},{"key":"22_CR45","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-319-66505-4_3","volume-title":"Network Security Metrics","author":"A Singhal","year":"2017","unstructured":"Singhal, A., Ou, X.: Security risk analysis of enterprise networks using probabilistic attack graphs. Network Security Metrics, pp. 53\u201373. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66505-4_3"},{"key":"22_CR46","unstructured":"Syed, R., Zhong, H.: Cybersecurity vulnerability management: An ontology-based conceptual model (2018)"},{"key":"22_CR47","unstructured":"Syed, Z., Padia, A., Finin, T., Mathews, L., Joshi, A.: UCO: A unified cybersecurity ontology. In: Workshops at the Thirtieth AAAI Conference on Artificial Intelligence (2016)"},{"issue":"10","key":"22_CR48","doi-asserted-by":"publisher","first-page":"2297","DOI":"10.1093\/comjnl\/bxu101","volume":"58","author":"T Takahashi","year":"2015","unstructured":"Takahashi, T., Kadobayashi, Y.: Reference ontology for cybersecurity operational information. Comput. J. 58(10), 2297\u20132312 (2015)","journal-title":"Comput. J."},{"key":"22_CR49","doi-asserted-by":"crossref","unstructured":"Takahashi, T., Fujiwara, H., Kadobayashi, Y.: Building ontology of cybersecurity operational information. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information intelligence Research. pp. 1\u20134 (2010)","DOI":"10.1145\/1852666.1852756"},{"issue":"3\/4","key":"22_CR50","first-page":"127","volume":"58","author":"T Takahashi","year":"2011","unstructured":"Takahashi, T., Kadobayashi, Y.: Cybersecurity information exchange techniques: Cybersecurity information ontology and cybex. J. National Instit. Inf. Commun. Technol. 58(3\/4), 127\u2013135 (2011)","journal-title":"J. National Instit. Inf. Commun. Technol."},{"key":"22_CR51","doi-asserted-by":"crossref","unstructured":"Takahashi, T., Kadobayashi, Y., Fujiwara, H.: Ontological approach toward cybersecurity in cloud computing. In: Proceedings of the 3rd International Conference on Security of Information and Networks. pp. 100\u2013109 (2010)","DOI":"10.1145\/1854099.1854121"},{"key":"22_CR52","unstructured":"Undercofer, J., Joshi, A., Finin, T., Pinkston, J., et al.: A target-centric ontology for intrusion detection. In: Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence (2003)"},{"issue":"3","key":"22_CR53","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1111\/j.1365-2575.1995.tb00108.x","volume":"5","author":"Y Wand","year":"1995","unstructured":"Wand, Y., Weber, R.: On the deep structure of information systems. Inf. Syst. J. 5(3), 203\u2013223 (1995)","journal-title":"Inf. Syst. J."},{"key":"22_CR54","doi-asserted-by":"crossref","unstructured":"Wang, J.Z., Ali, F.: An efficient ontology comparison tool for semantic web applications. In: The 2005 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI 2005). pp. 372\u2013378. IEEE (2005)","DOI":"10.1109\/WI.2005.28"},{"key":"22_CR55","doi-asserted-by":"crossref","unstructured":"Wang, J.A., Guo, M.: Ovm: an ontology for vulnerability management. In: 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies. pp. 1\u20134 (2009)","DOI":"10.1145\/1558607.1558646"},{"key":"22_CR56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43839-8","volume-title":"Design Science Methodology for Information Systems and Software Engineering","author":"R Wieringa","year":"2014","unstructured":"Wieringa, R.: Design Science Methodology for Information Systems and Software Engineering. Springer, Berlin (2014)"},{"key":"22_CR57","unstructured":"Zuanelli, E.: The cybersecurity ontology platform: the poc solution. e-AGE2017 p. 1 (2017)"}],"container-title":["Lecture Notes in Business Information Processing","The Practice of Enterprise Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63479-7_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,17]],"date-time":"2024-11-17T00:06:17Z","timestamp":1731801977000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-63479-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030634780","9783030634797"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63479-7_22","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PoEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Working Conference on The Practice of Enterprise Modeling","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Riga","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Latvia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"poem2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/poem2020.rtu.lv\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}