{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:00:35Z","timestamp":1743130835382,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030864743"},{"type":"electronic","value":"9783030864750"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-86475-0_3","type":"book-chapter","created":{"date-parts":[[2021,8,31]],"date-time":"2021-08-31T07:03:29Z","timestamp":1630393409000},"page":"22-34","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["SafecareOnto: A Cyber-Physical Security Ontology for Healthcare Systems"],"prefix":"10.1007","author":[{"given":"Fatma-Zohra","family":"Hannou","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Faten","family":"Atigui","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nadira","family":"Lammari","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Samira Si-said","family":"Cherfi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,9,1]]},"reference":[{"key":"3_CR1","unstructured":"ANSSI: Ebios risk manager - the method (2019). https:\/\/www.ssi.gouv.fr\/en\/guide\/ebios-risk-manager-the-method\/"},{"key":"3_CR2","doi-asserted-by":"publisher","unstructured":"Breier, J., Schindler, F.: Assets dependencies model in information security risk management. In: Linawati, M.M.S., Neuhold, E.J., Tjoa, A.M., You, I. (eds.) Information and Communication Technology-EurAsia Conference, pp. 405\u2013412. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55032-4_40","DOI":"10.1007\/978-3-642-55032-4_40"},{"issue":"2","key":"3_CR3","doi-asserted-by":"publisher","first-page":"49","DOI":"10.4018\/jswis.2005040103","volume":"1","author":"M Cristani","year":"2005","unstructured":"Cristani, M., Cuel, R.: A survey on ontology creation methodologies. Int. J. Semant. Web and Inf. Syst. (IJSWIS) 1(2), 49\u201369 (2005)","journal-title":"Int. J. Semant. Web and Inf. Syst. (IJSWIS)"},{"key":"3_CR4","unstructured":"Depoy, J., Phelan, J., Sholander, P., Smith, B., Varnado, G., Wyss, G.: Risk assessment for physical and cyber attacks on critical infrastructures. In: IEEE Military Communications Conference, pp. 1961\u20131969 (2005)"},{"key":"3_CR5","unstructured":"ENISA: Cyber security and resilience for Smart Hospitals (2016). https:\/\/www.enisa.europa.eu\/publications\/cyber-security-and-resilience-for-smart-hospitals"},{"key":"3_CR6","unstructured":"EU PROTECTIVE project: delivrable d4.1 (2017). https:\/\/protective-h2020.eu\/"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Fenz, S., Ekelhart, A.: Formalizing information security knowledge. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 183\u2013194 (2009)","DOI":"10.1145\/1533057.1533084"},{"key":"3_CR8","unstructured":"Fern\u00e1ndez-L\u00f3pez, M., G\u00f3mez-P\u00e9rez, A., Juristo, N.: Methontology: from ontological art towards ontological engineering (1997)"},{"issue":"1","key":"3_CR9","first-page":"7","volume":"3","author":"F Freitas","year":"2009","unstructured":"Freitas, F., Schulz, S., Moraes, E.: Survey of current terminologies and ontologies in biology and medicine. RECIIS-Electron. J. Commun. Inf. Innov. Health 3(1), 7\u201318 (2009)","journal-title":"RECIIS-Electron. J. Commun. Inf. Innov. Health"},{"issue":"5","key":"3_CR10","doi-asserted-by":"publisher","first-page":"907","DOI":"10.1006\/ijhc.1995.1081","volume":"43","author":"TR Gruber","year":"1995","unstructured":"Gruber, T.R.: Toward principles for the design of ontologies used for knowledge sharing? Int. J. Hum. Comput. Stud. 43(5), 907\u2013928 (1995)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"3_CR11","unstructured":"Gr\u00fcninger, M., Fox, M.S.: Methodology for the design and evaluation of ontologies (1995)"},{"key":"3_CR12","unstructured":"HITRUST: Healthcare sector cybersecurity framework - implementation guide v1.1 (2016). https:\/\/hitrustalliance.net\/"},{"key":"3_CR13","unstructured":"Horridge, M., Knublauch, H., Rector, A., Stevens, R., Wroe, C.: A practical guide to building owl ontologies using the Prot\u00e9g\u00e9-OWL plugin and co-ode tools edition 1.0. University of Manchester (2004)"},{"key":"3_CR14","unstructured":"Jakobson, G.: Mission cyber security situation assessment using impact dependency graphs. In: 14th International Conference on Information Fusion, pp. 1\u20138 (2011)"},{"key":"3_CR15","doi-asserted-by":"publisher","first-page":"110695","DOI":"10.1016\/j.jss.2020.110695","volume":"169","author":"BJ Kim","year":"2020","unstructured":"Kim, B.J., Lee, S.W.: Understanding and recommending security requirements from problem domain ontology: a cognitive three-layered approach. J. Syst. Softw. 169, 110695 (2020)","journal-title":"J. Syst. Softw."},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Li, T., Wang, X., Ni, Y.: Aligning social concerns with information system security: A fundamental ontology for social engineering. Inf. Syst. 101699 (2020)","DOI":"10.1016\/j.is.2020.101699"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Luh, R., Schrittwieser, S., Marschalek, S.: TAON: an ontology-based approach to mitigating targeted attacks (2016)","DOI":"10.1145\/3011141.3011157"},{"issue":"11","key":"3_CR18","first-page":"74","volume":"2002","author":"C Masolo","year":"2002","unstructured":"Masolo, C., Borgo, S., Gangemi, A., Guarino, N., Oltramari, A.: WonderWeb deliverable d17. Comput. Sci. Preprint Arch. 2002(11), 74\u2013110 (2002)","journal-title":"Comput. Sci. Preprint Arch."},{"key":"3_CR19","unstructured":"Noy, N.F., McGuinness, D.L., et al.: Ontology development 101: a guide to creating your first ontology (2001)"},{"issue":"4","key":"3_CR20","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/s10115-003-0138-1","volume":"6","author":"HS Pinto","year":"2004","unstructured":"Pinto, H.S., Martins, J.P.: Ontologies: how can they be built? Knowl. Inf. Syst. 6(4), 441\u2013464 (2004)","journal-title":"Knowl. Inf. Syst."},{"key":"3_CR21","doi-asserted-by":"publisher","unstructured":"Roussey, C., Pinet, F., Kang, M.A., Corcho, O.: An introduction to ontologies and ontology engineering. In: Ontologies in Urban Development Projects, pp. 9\u201338. Springer, London (2011). https:\/\/doi.org\/10.1007\/978-0-85729-724-2_2","DOI":"10.1007\/978-0-85729-724-2_2"},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-030-37670-3_4","volume-title":"Critical Information Infrastructures Security","author":"S Schauer","year":"2020","unstructured":"Schauer, S., Grafenauer, T., K\u00f6nig, S., Warum, M., Rass, S.: Estimating cascading effects in cyber-physical critical infrastructures. In: Nadjm-Tehrani, S. (ed.) CRITIS 2019. LNCS, vol. 11777, pp. 43\u201356. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-37670-3_4"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Silva, F.R.L., Jacob, P.: Mission-centric risk assessment to improve cyber situational awareness. Association for Computing Machinery (2018)","DOI":"10.1145\/3230833.3233281"},{"key":"3_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-92673-3","volume-title":"Handbook on Ontologies","author":"S Staab","year":"2010","unstructured":"Staab, S., Studer, R.: Handbook on Ontologies. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-540-92673-3"},{"issue":"2","key":"3_CR25","doi-asserted-by":"publisher","first-page":"107","DOI":"10.3233\/AO-150145","volume":"10","author":"MC Su\u00e1rez-Figueroa","year":"2015","unstructured":"Su\u00e1rez-Figueroa, M.C., G\u00f3mez-P\u00e9rez, A., Fern\u00e1ndez-L\u00f3pez, M.: The neon methodology framework: a scenario-based methodology for ontology development. Appl. Ontol. 10(2), 107\u2013145 (2015)","journal-title":"Appl. Ontol."},{"key":"3_CR26","unstructured":"Theocharidou, M., Giannopoulos, G.: Risk assessment methodologies for critical infrastructure protection. part II: a new approach (report EUR 27332) (2015)"},{"issue":"6","key":"3_CR27","first-page":"81","volume":"8","author":"X Tong","year":"2014","unstructured":"Tong, X., Ban, X.: A hierarchical information system risk evaluation method based on asset dependence chain. Int. J. Secur. Appl. 8(6), 81\u201388 (2014)","journal-title":"Int. J. Secur. Appl."},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Uschold, M., Gruninger, M., et al.: Ontologies: principles, methods and applications. Technical report University of Edinburgh Artificial Intelligence Applications Institute AIAI TR (1996)","DOI":"10.1017\/S0269888900007797"},{"issue":"3","key":"3_CR29","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.accinf.2013.10.004","volume":"15","author":"J vom Brocke","year":"2014","unstructured":"vom Brocke, J., Braccini, A.M., Sonnenberg, C., Spagnoletti, P.: Living it infrastructures - an ontology-based approach to aligning it infrastructure capacity and business needs. Int. J. Account. Inf. Syst. 15(3), 246\u2013274 (2014)","journal-title":"Int. J. Account. Inf. Syst."},{"key":"3_CR30","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.ijcip.2016.05.001","volume":"14","author":"R White","year":"2016","unstructured":"White, R., Burkhart, A., George, R., Boult, T., Chow, E.: Towards comparable cross-sector risk analyses: a re-examination of the risk analysis and management for critical asset protection (ramcap) methodology. Int. J. Crit. Infrastruct. Prot. 14, 28\u201340 (2016)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Wu, S., Zhang, Y., Chen, X.: Security assessment of dynamic networks with an approach of integrating semantic reasoning and attack graphs, pp. 1166\u20131174 (2018)","DOI":"10.1109\/CompComm.2018.8780998"}],"container-title":["Lecture Notes in Computer Science","Database and Expert Systems Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-86475-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T11:05:24Z","timestamp":1710327924000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-86475-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030864743","9783030864750"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-86475-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DEXA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database and Expert Systems Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dexa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dexa.org\/dexa2021","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"DEXA 2021 Workshops: 50 papers submitted, 23 papers accepted","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}